CVE-2018-10734

9.8 CRITICAL

📋 TL;DR

KONGTOP DVR devices contain a backdoor function that prints login passwords when called, allowing unauthorized access to device credentials. This affects specific KONGTOP DVR models (A303, A403, D303, D305, D403) used for video surveillance systems. Attackers can exploit this to gain administrative access to the DVR systems.

💻 Affected Systems

Products:
  • KONGTOP DVR A303
  • KONGTOP DVR A403
  • KONGTOP DVR D303
  • KONGTOP DVR D305
  • KONGTOP DVR D403
Versions: All versions with vulnerable firmware
Operating Systems: Embedded DVR firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with default configurations; specific firmware versions not documented in public sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of DVR systems leading to unauthorized video surveillance access, data exfiltration, device takeover for botnet participation, and physical security breaches.

🟠

Likely Case

Unauthorized access to DVR systems allowing viewing/manipulation of surveillance footage, configuration changes, and potential lateral movement to connected networks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Python proof-of-concept available on GitHub demonstrates password extraction via backdoor function call.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider replacing affected devices with secure alternatives from reputable vendors.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DVR devices on separate VLANs with strict firewall rules preventing external access.

Access Control Lists

all

Implement IP-based access restrictions allowing only authorized management stations to communicate with DVR devices.

🧯 If You Can't Patch

  • Replace affected KONGTOP DVR devices with secure alternatives from reputable vendors
  • Implement strict network segmentation and firewall rules to prevent any external access to DVR devices

🔍 How to Verify

Check if Vulnerable:

Check device model against affected list (A303, A403, D303, D305, D403). Test with available PoC script if in controlled environment.

Check Version:

Check device web interface or serial console for model and firmware information

Verify Fix Applied:

Verify device replacement with secure alternative or test that network controls prevent exploitation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Access from unexpected IP addresses
  • Configuration changes without authorization

Network Indicators:

  • Unexpected traffic to DVR management ports
  • Traffic patterns matching PoC exploitation

SIEM Query:

source_ip IN (dvr_management_ips) AND (event_type="authentication" OR event_type="configuration_change")

🔗 References

📤 Share & Export