A deficiency in handling authentication and authorization has been found with Kguard 104/108/v2 models. While password-based authentication is used by the ActiveX component to protect the login page, all the communication to the application server at port 9000 allows data to be communicated directly with insufficient or improper authorization. Proof of concept exploit included.
f2bc1717a93e9db3908a82aa2086b5693c8ed751e4401e4bc8ea701c009a43ec
Kguard SHA104 and SHA108 DVRs suffer from command injection, insufficient authentication and authorization, password disclosure, denial of service, and missing transport security vulnerabilities.
23f967513908ed1865432be70dd6383e588399ac116ed776c4f95b7a093d52b3
Aztech DSL5018EN, DSL705E, and DSL705EU ADSL modems/routers suffer from broken session management, denial of service, file exposure, and parameter tampering vulnerabilities.
f6d378232da2f6443ab2049ec99245e887f6a80eb6f0844fa10661d9cbd6ca5d