Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.809067
Category:Web application abuses
Title:AVTECH Devices Multiple Vulnerabilities
Summary:an AVTECH device(IP camera/NVR/DVR) is prone to multiple vulnerabilities. This vulnerability was known to be exploited by the IoT Botnet 'Reaper' in 2017.
Description:Summary:
an AVTECH device(IP camera/NVR/DVR) is prone to multiple vulnerabilities. This vulnerability was known to be exploited by the IoT Botnet 'Reaper' in 2017.

Vulnerability Insight:
Multiple flaws are due to:

- HTTPS is used without certificate verification.

- Under the '/cgi-bin/nobody' folder every CGI script can be accessed
without authentication.

- The web interface does not use any CSRF protection.

- Every user password is stored in clear text.

- The cgi_query action in Search.cgi performs HTML requests with the wget
system command, which uses the received parameters without sanitization
or verification.

- The captcha verification is bypassed if the login requests contain the
login=quick parameter.

- No verification or white list-based checking of the parameter of the
DoShellCmd function in ActionD daemon in 'adcommand.cgi' script.

- The video player plugins are stored as .cab files in the web root, which can
be accessed and downloaded without authentication.

- The web server sends the file without processing it when a cab file is
requested.

- The devices that support the Avtech cloud contain CloudSetup.cgi, which can
be accessed after authentication.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to execute arbitrary system commands with root privileges, to bypass
authentication, to access sensitive information and to conduct MITM attack.

Affected Software/OS:
Avtech device (IP camera, NVR, DVR) with
firmware version as mentioned in the referenced links.

Solution:
No known solution was made available for at least one year since the disclosure of this vulnerability.
Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
9.4

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:N

CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.