26 lines
No EOL
941 B
Text
26 lines
No EOL
941 B
Text
**************************************************************
|
|
Product: Everfocus EDSR series
|
|
Version affected: 1.4 and older
|
|
Website: http://www.everfocus.com/
|
|
Discovered By: Andrea Fabrizi
|
|
Email: andrea.fabrizi () gmail com
|
|
Web: http://www.andreafabrizi.it
|
|
Vuln: remote DVR applet authentication bypass
|
|
**************************************************************
|
|
|
|
The EDSR firmware don't handle correctly users authentication and sessions.
|
|
|
|
This exploit let you to connect to every remote DVR (without username
|
|
and password) and see the live cams :)
|
|
Exploit: http://www.andreafabrizi.it/files/EverFocus_Edsr_Exploit.tar.gz
|
|
|
|
I discovered this vulnerability one year ago and i have informed the
|
|
vendor, but apparently
|
|
there is no solution at this time.
|
|
|
|
--
|
|
Andrea Fabrizi
|
|
http://www.andreafabrizi.it
|
|
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10209.tar.gz (2009-11-22-EverFocus_Edsr_Exploit.tar.gz) |