Cohuhd

3960hd Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.27%
  • Veröffentlicht 22.11.2017 08:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Information disclosure through directory listing on the Cohu 3960HD allows an attacker to view and download source code, log files, and other sensitive device information via a specially crafted web request with an extra / character, such as a "GET /...

  • EPSS 1.07%
  • Veröffentlicht 22.11.2017 08:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Missing authentication for the remote configuration port 1236/tcp on the Cohu 3960HD allows an attacker to change configuration parameters such as IP address and username/password via specially crafted XML SOAP packets.

  • EPSS 0.34%
  • Veröffentlicht 22.11.2017 08:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The webupgrade function on the Cohu 3960HD does not verify the firmware upgrade files or process, allowing an attacker to upload a specially crafted postinstall.sh file that will be executed with "root" privileges.

  • EPSS 0.3%
  • Veröffentlicht 22.11.2017 08:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Information disclosure of .esp source code on the Cohu 3960 allows an attacker to view sensitive information such as application logic with a simple web browser.

  • EPSS 0.65%
  • Veröffentlicht 22.11.2017 08:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Client-side enforcement using JavaScript of server-side security options on the Cohu 3960HD allows an attacker to manipulate options sent to the camera and cause malfunction or code execution, as demonstrated by a client-side "if (!passwordsAreEqual(...