Summary
This host is running AVTECH DVR and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attacker to bypass CAPTCHA requests, cause a buffer overflow resulting in a denial of service or potentially allowing the execution of arbitrary code.
Impact Level: System/Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Multiple flaws are due to,
- The device sending 10 hardcoded CAPTCHA requests after an initial purposefully false CAPTCHA request.
- An user-supplied input is not properly validated when handling RTSP transactions.
- An user-supplied input is not properly validated when handling input passed via the 'Network.SMTP.Receivers' parameter to the /cgi-bin/user/Config.cgi script.
Affected
DVR 4CH H.264 (AVTECH AVN801) firmware 1017-1003-1009-1003
Detection
Send crafted HTTP GET request and check it is possible bypass the captcha verification or not.
References
Severity
Classification
-
CVE CVE-2013-4980, CVE-2013-4981, CVE-2013-4982 -
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Apache Struts2 Redirection and Security Bypass Vulnerabilities
- ArticleFR CMS 'id' Parameter SQL Injection Vulnerability
- Awstats Configuration File Remote Arbitrary Command Execution Vulnerability
- ActualAnalyzer Lite 'ant' Cookie Parameter Remote Command Execution Vulnerability
- Apache Solr XML External Entity(XXE) Vulnerability-02 Jan-14