The web server of the E1 Zoom camera through 3.0.0.716 discloses its configuration via the /conf/ directory that is mapped to a publicly accessible path. In this way an attacker can download the entire NGINX/FastCGI configurations by querying the /conf/nginx.conf or /conf/fastcgi.conf URI.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T02:27:31.538Z
Reserved: 2021-08-27T00:00:00
Link: CVE-2021-40150
No data.
Status : Modified
Published: 2022-07-17T23:15:08.347
Modified: 2024-11-21T06:23:40.330
Link: CVE-2021-40150
No data.
OpenCVE Enrichment
No data.
Weaknesses