lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 8 Nov 2013 17:21:30 GMT
From: Johannes.Ernst@...il.com
To: bugtraq@...urityfocus.com
Subject: Belkin WiFi NetCam video stream backdoor with unchangeable
 admin/admin credentials

Product:
    Product NetCam WiFi Camera With Night Vision, purchased August 2013

Summary:
    Live video stream is accessible with user/password of admin/admin.
    The user/password combination admin/admin cannot be changed by the user.
    This "feature" is undocumented.
    
To reproduce:
    1. Connect webcam to Ethernet or WiFi
    2. Access webcam's IP address through a browser, e.g. http://1.2.3.4/
    3. Enter admin/admin as user/password. This will produce an empty page with a copyright notice of "Go Ahead Software Inc., 1994-2000" as an HTML comment
    4. Access relative URL /goform/video, e.g. http://1.2.3.4/goform/video to see M-JPEG live video from the camera

Status:
    * Reported to Belkin August 6th.
    * To the best of my knowledge, Belkin:
        * has not notified existing users of the product of the vulnerability
        * has not recalled products
        * is not actively encouraging users to upgrade their firmware
        * has "improved" the firmware in unspecified ways since the initial report. (direct communication)
        * has not published details or release notes of the "firmware improvements", or stated whether and when the new version started shipping on NetCams. The PDF user manual on the Belkin site as of today still references firmware version 2.3.0.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ