Dahuasecurity

Dvr1604hf-l-e

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.82%
  • Veröffentlicht 17.09.2013 12:04:28
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The authorization implementation on Dahua DVR appliances accepts a hash string representing the current date for the role of a master password, which makes it easier for remote attackers to obtain administrative access and change the administrator pa...

  • EPSS 9.23%
  • Veröffentlicht 17.09.2013 12:04:24
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified "backdoor" account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a stan...

  • EPSS 8.49%
  • Veröffentlicht 17.09.2013 12:04:24
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Dahua DVR appliances do not properly restrict UPnP requests, which makes it easier for remote attackers to obtain access via vectors involving a replay attack against the TELNET port.

  • EPSS 11.62%
  • Veröffentlicht 17.09.2013 12:04:24
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Dahua DVR appliances have a small value for the maximum password length, which makes it easier for remote attackers to obtain access via a brute-force attack.

  • EPSS 6.52%
  • Veröffentlicht 17.09.2013 12:04:24
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Dahua DVR appliances use a password-hash algorithm with a short hash length, which makes it easier for context-dependent attackers to discover cleartext passwords via a brute-force attack.