CVE-2018-15745 Scanner
CVE-2018-15745 scanner - Directory Traversal vulnerability in Argus Surveillance DVR
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 3 days
Scan only one
URL
Toolbox
-
Argus Surveillance DVR is a security camera device that allows users to monitor and record activity in their homes, offices and other locations. The system offers remote access, real-time alerts, motion detection, and many other security features. The device is designed to help individuals and organizations monitor their premises, detect intrusions, and prevent theft or other crimes.
One vulnerability that has been discovered in Argus Surveillance DVR is CVE-2018-15745. This vulnerability allows hackers to access files on the device without proper authentication. The vulnerability is caused by an unauthenticated directory traversal that can be triggered by entering "..%2F" into the WEBACCOUNT.CGI RESULTPAGE parameter.
Exploiting this vulnerability can lead to the disclosure of sensitive information, such as user data, camera footage, and other files stored on the device. This information can be used by attackers to carry out other malicious activities, including identity theft, cyber espionage or fraud. The vulnerability can also compromise the overall security of the device and make it more vulnerable to other types of attacks.
In conclusion, it is essential for individuals and organizations to be aware of the potential vulnerabilities in their digital assets, such as the Argus Surveillance DVR device. By taking proactive measures to secure these devices and staying informed about potential threats, users can help prevent security breaches and protect sensitive information. The s4e.io platform offers pro features for detecting vulnerabilities in digital assets, allowing users to stay informed and take necessary actions to prevent cyberattacks.
REFERENCES