Vulnerability Description
Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) versions prior to 1.3.4 contain an authentication bypass in the NVMS-9000 control protocol. By sending a single crafted TCP payload to an exposed NVMS-9000 control port, an unauthenticated remote attacker can invoke privileged administrative query commands without valid credentials. Successful exploitation discloses sensitive information including administrator usernames and passwords in cleartext, network and service configuration, and other device details via commands such as queryBasicCfg, queryUserList, queryEmailCfg, queryPPPoECfg, and queryFTPCfg.
Related Weaknesses (CWE)
References
- https://ssd-disclosure.com/ssd-advisory-nvms9000-information-disclosure/
- https://undercodetesting.com/eleven11-botnet-mirai-variant-targeting-nvms-9000-d
- https://www.greynoise.io/blog/surge-exploitation-attempts-tvt-dvrs
- https://www.vulncheck.com/advisories/tvt-nvms9000-unauthenticated-admin-queries-
FAQ
What is CVE-2024-14007?
CVE-2024-14007 is a documented vulnerability. Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) versions prior to 1.3.4 contain an authentication bypass in the NVMS-9000 control protoco...
How severe is CVE-2024-14007?
CVSS scoring is not yet available for CVE-2024-14007. Check NVD for updates.
Is there a patch for CVE-2024-14007?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.