Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream by crafting a set of RTSP packets with a specific set of URLs that can be used to redirect the camera feed. NOTE: the vendor's perspective is that the Anonymous120386 sample code can establish RTSP protocol communictaion, but cannot obtain video or audio data; thus, there is no risk.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://ezviz.com | |
https://github.com/Anonymous120386/Anonymous |
History
Thu, 29 Aug 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream by crafting a set of RTSP packets with a specific set of URLs that can be used to redirect the camera feed. | Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream by crafting a set of RTSP packets with a specific set of URLs that can be used to redirect the camera feed. NOTE: the vendor's perspective is that the Anonymous120386 sample code can establish RTSP protocol communictaion, but cannot obtain video or audio data; thus, there is no risk. |
Fri, 23 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ezviz
Ezviz cs-cv246 Firmware |
|
Weaknesses | CWE-20 | |
CPEs | cpe:2.3:o:ezviz:cs-cv246_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ezviz
Ezviz cs-cv246 Firmware |
|
Metrics |
cvssV3_1
|
Fri, 23 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream by crafting a set of RTSP packets with a specific set of URLs that can be used to redirect the camera feed. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-08-23T00:00:00
Updated: 2024-08-29T13:02:08.313280
Reserved: 2024-08-05T00:00:00
Link: CVE-2024-42531
Vulnrichment
Updated: 2024-08-23T19:09:28.304Z
NVD
Status : Awaiting Analysis
Published: 2024-08-23T17:15:09.833
Modified: 2024-08-29T13:15:06.843
Link: CVE-2024-42531
Redhat
No data.