CVE-2024-14007
Description
Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) versions prior to 1.3.4 contain an authentication bypass in the NVMS-9000 control protocol. By sending a single crafted TCP payload to an exposed NVMS-9000 control port, an unauthenticated remote attacker can invoke privileged administrative query commands without valid credentials. Successful exploitation discloses sensitive information including administrator usernames and passwords in cleartext, network and service configuration, and other device details via commands such as queryBasicCfg, queryUserList, queryEmailCfg, queryPPPoECfg, and queryFTPCfg.
Affected products
1- Range: <1.3.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- ssd-disclosure.com/ssd-advisory-nvms9000-information-disclosure/nvd
- undercodetesting.com/eleven11-botnet-mirai-variant-targeting-nvms-9000-devices/nvd
- www.greynoise.io/blog/surge-exploitation-attempts-tvt-dvrsnvd
- www.vulncheck.com/advisories/tvt-nvms9000-unauthenticated-admin-queries-and-information-disclosurenvd
News mentions
0No linked articles in our index yet.