re-add files.csv
This commit is contained in:
parent
6cacab32e4
commit
fcd524a868
2 changed files with 27709 additions and 0 deletions
26
platforms/webapps/10209.txt
Executable file
26
platforms/webapps/10209.txt
Executable file
|
@ -0,0 +1,26 @@
|
|||
**************************************************************
|
||||
Product: Everfocus EDSR series
|
||||
Version affected: 1.4 and older
|
||||
Website: http://www.everfocus.com/
|
||||
Discovered By: Andrea Fabrizi
|
||||
Email: andrea.fabrizi () gmail com
|
||||
Web: http://www.andreafabrizi.it
|
||||
Vuln: remote DVR applet authentication bypass
|
||||
**************************************************************
|
||||
|
||||
The EDSR firmware don't handle correctly users authentication and sessions.
|
||||
|
||||
This exploit let you to connect to every remote DVR (without username
|
||||
and password) and see the live cams :)
|
||||
Exploit: http://www.andreafabrizi.it/files/EverFocus_Edsr_Exploit.tar.gz
|
||||
|
||||
I discovered this vulnerability one year ago and i have informed the
|
||||
vendor, but apparently
|
||||
there is no solution at this time.
|
||||
|
||||
--
|
||||
Andrea Fabrizi
|
||||
http://www.andreafabrizi.it
|
||||
|
||||
|
||||
http://www.exploit-db.com/sploits/2009-11-22-EverFocus_Edsr_Exploit.tar.gz
|
Loading…
Add table
Reference in a new issue