CVE-2017-11634
📋 TL;DR
This vulnerability allows remote attackers to discover the admin password for Wireless IP Camera 360 devices by connecting to TCP port 9527 and reading weakly encoded debugging information. The password is encoded in a predictable way (e.g., 'nTBCS19C' corresponds to '123456'). All users of affected Wireless IP Camera 360 devices are at risk.
💻 Affected Systems
- Wireless IP Camera 360 devices
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise allowing attackers to view camera feeds, modify settings, disable security features, or use the device as a foothold into the network.
Likely Case
Unauthorized access to camera feeds and device settings, potentially enabling surveillance or disabling security monitoring.
If Mitigated
No impact if devices are behind firewalls with port 9527 blocked or if passwords are changed from default.
🎯 Exploit Status
Exploitation requires only a TCP connection to port 9527 and basic decoding of the password field. Tools and scripts are publicly available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No known vendor advisory
Restart Required: No
Instructions:
No official patch available. Contact device manufacturer for firmware updates or replacement options.
🔧 Temporary Workarounds
Block Port 9527
allPrevent external and internal access to the vulnerable debugging service port
iptables -A INPUT -p tcp --dport 9527 -j DROP
netsh advfirewall firewall add rule name="Block Camera Debug Port" dir=in action=block protocol=TCP localport=9527
Change Admin Password
allChange the admin password to a strong, unique value not derived from simple encoding patterns
Use camera web interface to change admin password
🧯 If You Can't Patch
- Isolate cameras on separate VLAN with strict firewall rules blocking all unnecessary ports
- Disable remote access features and ensure cameras are only accessible from trusted internal networks
🔍 How to Verify
Check if Vulnerable:
Connect to device IP on TCP port 9527 using netcat or telnet: 'nc [IP] 9527' or 'telnet [IP] 9527'. Look for password field in response.
Check Version:
Check firmware version via camera web interface under Settings > System > Version
Verify Fix Applied:
Attempt connection to port 9527 - should timeout or be refused. Verify new admin password works via web interface.
📡 Detection & Monitoring
Log Indicators:
- Failed login attempts with decoded passwords
- Unexpected connections to port 9527
Network Indicators:
- Outbound connections from cameras to suspicious IPs
- Port scanning activity targeting port 9527
SIEM Query:
source_ip="camera_ip" AND dest_port=9527 OR event_type="authentication_failure" AND user="admin"