CVE-2019-7315

Genie Access WIP3BVAF WISH IP 3MP IR Auto Focus Bullet Camera devices through 3.x are vulnerable to directory traversal via the web interface, as demonstrated by reading /etc/shadow. NOTE: this product is discontinued, and its final firmware version has this vulnerability (4.x versions exist only for other Genie Access products).
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:genieaccess:wip3bvaf_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:genieaccess:wip3bvaf:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:47

Type Values Removed Values Added
References () https://labs.nettitude.com/blog/cve-2019-7315-genie-access-wip3bvaf-ip-camera-directory-traversal/ - Exploit, Third Party Advisory () https://labs.nettitude.com/blog/cve-2019-7315-genie-access-wip3bvaf-ip-camera-directory-traversal/ - Exploit, Third Party Advisory

Information

Published : 2019-06-17 19:15

Updated : 2024-11-21 04:47


NVD link : CVE-2019-7315

Mitre link : CVE-2019-7315

CVE.ORG link : CVE-2019-7315


JSON object : View

Products Affected

genieaccess

  • wip3bvaf
  • wip3bvaf_firmware
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')