Vulnerability Description
TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6 have an empty password for the hardcoded "qmik" account, which allows remote attackers to obtain administrative access via a TELNET session.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Sc3130 | - |
| Tp-Link | Tl-Sc3130G | - |
| Tp-Link | Tl-Sc3171 | - |
| Tp-Link | Tl-Sc3171G | - |
| Tp-Link | Lm Firmware | <= 1.6.18p12_sign5 |
Related Weaknesses (CWE)
References
- http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc317Exploit
- http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc317Exploit
FAQ
What is CVE-2013-2579?
CVE-2013-2579 is a vulnerability with a CVSS score of 10.0 (HIGH). TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6 have an empty password for the hardcoded "qmik" account, which allows...
How severe is CVE-2013-2579?
CVE-2013-2579 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2579?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Sc3130, Tp-Link Tl-Sc3130G, Tp-Link Tl-Sc3171, Tp-Link Tl-Sc3171G, Tp-Link Lm Firmware.