CVE-2019-14698

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in MicroDigital N-series camera firmware allows remote attackers to execute arbitrary code by sending specially crafted HTTP requests to a CGI program. This affects cameras running firmware versions up to 6400.0.8.5, enabling complete system compromise.

💻 Affected Systems

Products:
  • MicroDigital N-series cameras
Versions: Firmware through 6400.0.8.5
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The CGI program runs under the HTTPD web server with the param parameter being the attack vector.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution leading to camera compromise, lateral movement to other devices, persistent backdoor installation, and surveillance data exfiltration.

🟠

Likely Case

Remote attackers gain shell access with nobody user privileges, allowing them to modify camera settings, disable security features, or use the device as a pivot point.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the camera device itself without lateral movement capabilities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on pastebin. The vulnerability requires no authentication and has a straightforward exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://www.microdigital.co.kr/

Restart Required: Yes

Instructions:

1. Check vendor website for firmware updates
2. If update available, download and verify checksum
3. Upload firmware through camera web interface
4. Reboot camera after update completion

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on separate VLAN with strict firewall rules

Access Control

linux

Restrict HTTP access to camera web interface to trusted IPs only

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Disable remote web interface access entirely
  • Replace vulnerable cameras with patched models from different vendors

🔍 How to Verify

Check if Vulnerable:

Check firmware version in camera web interface under System > Information. If version is 6400.0.8.5 or lower, device is vulnerable.

Check Version:

curl -s http://camera-ip/cgi-bin/getinfo.cgi | grep firmware

Verify Fix Applied:

Verify firmware version is above 6400.0.8.5 after update. Test with known exploit payloads to confirm mitigation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CGI program execution
  • Large param values in HTTP requests
  • Buffer overflow error messages in system logs

Network Indicators:

  • HTTP requests with abnormally long param values to CGI endpoints
  • Shell connection attempts from camera IP

SIEM Query:

source="camera_logs" AND (param_length>1000 OR "buffer overflow" OR "segmentation fault")

🔗 References

📤 Share & Export