Description
LG LNB*, LND*, LNU*, and LNV* smart network camera devices have broken access control. Attackers are able to download /updownload/t.report (aka Log & Report) files and download backup files (via download.php) without authenticating. These backup files contain user credentials and configuration information for the camera device. An attacker is able to discover the backup filename via reading the system logs or report data, or just by brute-forcing the backup filename pattern. It may be possible to authenticate to the admin account with the admin password.
Exploits (1)
exploitdb
WORKING POC
by Ege Balci · pythonwebappshardware
https://www.exploit-db.com/exploits/45394
Scores
CVSS v3
7.5
EPSS
0.1101
EPSS Percentile
93.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-552
Status
published
Products (18)
lg/lnb5110_firmware
1310250 - 1508190
lg/lnb5320_firmware
1310250 - 1508190
lg/lnb5320r_firmware
1310250 - 1508190
lg/lnb7210_firmware
1310250 - 1508190
lg/lnd3230r_firmware
1310250 - 1508190
lg/lnd5110_firmware
1310250 - 1508190
lg/lnd5110r_firmware
1310250 - 1508190
lg/lnd5220r_firmware
1310250 - 1508190
lg/lnd7210_firmware
1310250 - 1508190
lg/lnd7210r_firmware
1310250 - 1508190
... and 8 more
Published
Sep 12, 2018
Tracked Since
Feb 18, 2026