lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <900ea070910220250r50377047o84b30f7b33461f1f@mail.gmail.com> Date: Thu, 22 Oct 2009 11:50:50 +0200 From: Andrea Fabrizi <andrea.fabrizi@...il.com> To: bugtraq@...urityfocus.com Subject: Everfocus EDR1600 remote authentication bypass ************************************************************** Product: Everfocus EDR1600 Version affected: all Website: http://www.everfocus.com/ Discovered By: Andrea Fabrizi Email: andrea.fabrizi@...il.com Web: http://www.andreafabrizi.it Vuln: remote DVR authentication bypass ************************************************************** The EDR1600 firmware don't handle correctly users authentication and sessions. This exploit let you to connect to every remote DVR (without username and password) and see the live cams :) Exploit: http://www.andreafabrizi.it/files/EverFocus_edr1600_Exploit.tar.gz