Description
JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the VN-T216VPRU model) contain a directory traversal vulnerability in the checkcgi endpoint that accepts a user-controlled file parameter. An unauthenticated remote attacker can leverage this vulnerability to read arbitrary files on the device.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Yakir Wizman · textwebappscgi
https://www.exploit-db.com/exploits/40282
References (4)
Core 4
Core References
Various Sources technical-description
https://web.archive.org/web/20170713051843/http://www.black-rose.ml/2016/08/analyzing-security-cameras-products.html
Various Sources product
http://pro.jvc.com/prof/attributes/tech_desc.jsp?model_id=MDL102145&feature_id=02
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/40282
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/jvc-vnt-ip-camera-directory-traversal-via-check-cgi
Scores
CVSS v4
8.7
EPSS
0.0147
EPSS Percentile
81.0%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (1)
JVC (JVCKENWOOD)/IP-Camera (VN-T216VPRU)
< 2016-08-22
Published
Nov 12, 2025
Tracked Since
Feb 18, 2026