[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Belkin NetCam Wifi Camera Hardcoded Credentials

Author
Johannes Ernst
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-21501
Category
web applications
Date add
12-11-2013
Platform
hardware
Product:
    Product NetCam WiFi Camera With Night Vision, purchased August 2013

Summary:
    Live video stream is accessible with user/password of admin/admin.
    The user/password combination admin/admin cannot be changed by the user.
    This "feature" is undocumented.
    
To reproduce:
    1. Connect webcam to Ethernet or WiFi
    2. Access webcam's IP address through a browser, e.g. http://1.2.3.4/
    3. Enter admin/admin as user/password. This will produce an empty page with a copyright notice of "Go Ahead Software Inc., 1994-2000" as an HTML comment
    4. Access relative URL /goform/video, e.g. http://1.2.3.4/goform/video to see M-JPEG live video from the camera

Status:
    * Reported to Belkin August 6th.
    * To the best of my knowledge, Belkin:
        * has not notified existing users of the product of the vulnerability
        * has not recalled products
        * is not actively encouraging users to upgrade their firmware
        * has "improved" the firmware in unspecified ways since the initial report. (direct communication)
        * has not published details or release notes of the "firmware improvements", or stated whether and when the new version started shipping on NetCams. The PDF user manual on the Belkin site as of today still references firmware version 2.3.0.

#  0day.today [2024-12-24]  #