Impact
An issue in the Intelbras VIP 1230‑D‑G4 allows a remote attacker to trigger the password reset feature and obtain sensitive information. The vulnerability is accessed via the /OutsideCmd endpoint, suggesting that the reset process does not adequately protect or validate the request, leading to unintended disclosure of credentials or other confidential data. This can compromise the confidentiality of the device’s configuration and potentially provide a foothold for further attacks.
Affected Systems
Intelbras VIP‑1230‑D‑G4 cameras running firmware V2.800.00IB00C.0.T are affected. The model is a Wi‑Fi dome camera listed under Intelbras’ product line, and the vulnerability exists specifically in that firmware version.
Risk and Exploitability
The CVSS score of 5.3 places this vulnerability in the medium severity range. EPSS is not available, so the likelihood of exploitation is uncertain. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is remote, requiring network access to reach the /OutsideCmd endpoint, and the attacker can retrieve sensitive data during the password reset process.
OpenCVE Enrichment