Page 2 of 8 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 780EXPL: 1

An issue was discovered in multiple models of Axis IP Cameras. There is an Incorrect Size Calculation. Se ha descubierto un problema en múltiples modelos de las cámaras IP Axis. Existe un cálculo de tamaño incorrecto. Axis Cameras suffer from authorization bypass, unrestricted dbus access, command injection, denial of service, and information disclosure vulnerabilities. • https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras https://www.axis.com/files/faq/Advisory_ACV-128401.pdf https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 9%CPEs: 780EXPL: 2

An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection. Se ha descubierto un problema en múltiples modelos de las cámaras IP Axis. Existe inyección de comandos Shell. Axis Cameras suffer from authorization bypass, unrestricted dbus access, command injection, denial of service, and information disclosure vulnerabilities. • https://www.exploit-db.com/exploits/45100 https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras https://www.axis.com/files/faq/Advisory_ACV-128401.pdf https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.6EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). • https://www.slideshare.net/secret/aewA1dZwZ9FQ8g • CWE-434: Unrestricted Upload of File with Dangerous Type •