Description
The Loftek Nexus 543 IP Camera stores passwords in cleartext, which allows remote attackers to obtain sensitive information via an HTTP GET request to check_users.cgi. NOTE: cleartext passwords can also be obtained from proc/kcore when leveraging the directory traversal vulnerability in CVE-2013-3311.
Exploits (1)
exploitdb
WORKING POC
by Craig Young · textwebappshardware
https://www.exploit-db.com/exploits/27878
References (3)
Core 3
Core References
Exploit x_refsource_misc
http://www.tripwire.com/state-of-security/vulnerability-management/vulnerability-who-is-watching-your-ip-camera
Third Party Advisory, VDB Entry x_refsource_misc
http://www.securityfocus.com/bid/61971
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
https://www.exploit-db.com/exploits/27878
Scores
CVSS v3
7.5
EPSS
0.0173
EPSS Percentile
82.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-522
Status
published
Products (1)
loftek/nexus_543_firmware
Published
Nov 21, 2019
Tracked Since
Feb 18, 2026