Vulnerability Description
JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the VN-T216VPRU model) contain a directory traversal vulnerability in the checkcgi endpoint that accepts a user-controlled file parameter. An unauthenticated remote attacker can leverage this vulnerability to read arbitrary files on the device.
Related Weaknesses (CWE)
References
- http://pro.jvc.com/prof/attributes/tech_desc.jsp?model_id=MDL102145&feature_id=0
- https://web.archive.org/web/20170713051843/http://www.black-rose.ml/2016/08/anal
- https://www.exploit-db.com/exploits/40282
- https://www.vulncheck.com/advisories/jvc-vnt-ip-camera-directory-traversal-via-c
FAQ
What is CVE-2016-15055?
CVE-2016-15055 is a documented vulnerability. JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the VN-T216VPRU model) contain a directory traversal vulnerability in the checkcgi endpoint that accepts a user-controlled fi...
How severe is CVE-2016-15055?
CVSS scoring is not yet available for CVE-2016-15055. Check NVD for updates.
Is there a patch for CVE-2016-15055?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.