Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation.
CVSS Information
N/A
Vulnerability Type
使用硬编码的凭证
Vulnerability Title
Shenzhen Liandian Communication Technology V380 IP Camera 安全漏洞
Vulnerability Description
Shenzhen Liandian Communication Technology V380 IP Camera是深圳联电(Shenzhen Liandian Communication Technology)公司的一款摄像头。 Shenzhen Liandian Communication Technology V380 IP Camera AppFHE1_V1.0.6.0版本存在安全漏洞,该漏洞源于默认启用Telnet服务并存在硬编码凭证,可能导致远程代码执行和权限提升。
CVSS Information
N/A
Vulnerability Type
N/A