Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
network camera firmware vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2015-2280
snwrite.cgi in AirLink101 SkyIPCam1620W Wireless N MPEG4 3GPP network camera with firmware FW_AIC1620W_1.1.0-12_20120709_r1192.pck allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the mac parameter.
Airlink101 Skyipcam1620w Wireless N Mpeg4 3gpp Firmware 1.1.0-12 20120709
1 EDB exploit
8.1
CVSSv3
CVE-2022-23382
Shenzhen Hichip Vision Technology IP Camera Firmware V11.4.8.1.1-20170926 has a denial of service vulnerability through sending a crafted multicast message in a local network.
Hichip Shenzhen Hichip Vision Technology Firmware 11.4.8.1.1-20170926
8.1
CVSSv3
CVE-2021-30165
The default administrator account & password of the EDIMAX wireless network camera is hard-coded. Remote attackers can disassemble firmware to obtain the privileged permission and further control the devices.
Edimax Ic-3140w Firmware 3.11
8.1
CVSSv3
CVE-2018-3892
An exploitable firmware downgrade vulnerability exists in the time syncing functionality of Yi Home Camera 27US 1.8.7.0D. A specially crafted packet can cause a buffer overflow, resulting in code execution. An attacker can intercept and alter network traffic to trigger this vulne...
Yitechnology Yi Home Camera Firmware 1.8.7.0d
8
CVSSv3
CVE-2023-34551
In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versio...
Ezviz Cs-c6n-b0-1g2wf Firmware
Ezviz Cs-c6n-r101-1g2wf Firmware
Ezviz Cs-cv310-a0-1b2wfr Firmware
Ezviz Cs-cv310-a0-1c2wfr-c Firmware
Ezviz Cs-c6n-a0-1c2wfr-mul Firmware
Ezviz Cs-cv310-a0-3c2wfrl-1080p Firmware
Ezviz Cs-cv310-a0-1c2wfr Firmware
Ezviz Cs-cv248-a0-32wmfr Firmware
Ezviz Lc1c Firmware
1 Github repository
7.5
CVSSv3
CVE-2022-3001
This vulnerability exists in Milesight Video Management Systems (VMS), all firmware versions before 40.7.0.79-r1, due to improper input handling at camera’s web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted htt...
Milesight Video Management Systems Firmware 40.7.0.79
Milesight Video Management Systems Firmware
7.5
CVSSv3
CVE-2022-37680
An improper authentication for critical function issue in Hitachi Kokusai Electric Network products for monitoring system (Camera, Decoder and Encoder) and bellow allows attckers to remotely reboot the device via a crafted POST request to the endpoint /ptipupgrade.cgi. Security i...
Hitachi Hc-ip9100hd Firmware
7.5
CVSSv3
CVE-2022-37681
Hitachi Kokusai Electric Newtork products for monitoring system (Camera, Decoder and Encoder) and below allows attckers to perform a directory traversal via a crafted GET request to the endpoint /ptippage.cgi. Security information ID hitachi-sec-2022-001 contains fixes for the is...
Hitachi Hc-ip9100hd Firmware
7.5
CVSSv3
CVE-2017-9829
'/cgi-bin/admin/downloadMedias.cgi' of the web service in most of the VIVOTEK Network Cameras is vulnerable, which allows remote malicious users to read any file on the camera's Linux filesystem via a crafted HTTP request containing ".." sequences. This v...
Vivotek Network Camera Ib8369 Firmware Ib8369-vvtk-0102a
Vivotek Network Camera Fd8164 Firmware Fd8164- Vvtk-0200b
Vivotek Network Camera Fd816ba Firmware Fd816ba-vvtk-010101.
7.5
CVSSv3
CVE-2008-4390
The Cisco Linksys WVC54GC wireless video camera before firmware 1.25 sends cleartext configuration data in response to a Setup Wizard remote-management command, which allows remote malicious users to obtain sensitive information such as passwords by sniffing the network.
Cisco Linksys Wvc54gc Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »