Belkin NetCam Wifi Camera Hardcoded Credentials

2013.11.12
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Product: Product NetCam WiFi Camera With Night Vision, purchased August 2013 Summary: Live video stream is accessible with user/password of admin/admin. The user/password combination admin/admin cannot be changed by the user. This "feature" is undocumented. To reproduce: 1. Connect webcam to Ethernet or WiFi 2. Access webcam's IP address through a browser, e.g. http://1.2.3.4/ 3. Enter admin/admin as user/password. This will produce an empty page with a copyright notice of "Go Ahead Software Inc., 1994-2000" as an HTML comment 4. Access relative URL /goform/video, e.g. http://1.2.3.4/goform/video to see M-JPEG live video from the camera Status: * Reported to Belkin August 6th. * To the best of my knowledge, Belkin: * has not notified existing users of the product of the vulnerability * has not recalled products * is not actively encouraging users to upgrade their firmware * has "improved" the firmware in unspecified ways since the initial report. (direct communication) * has not published details or release notes of the "firmware improvements", or stated whether and when the new version started shipping on NetCams. The PDF user manual on the Belkin site as of today still references firmware version 2.3.0.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top