CVE-2021-30167

9.8 CRITICAL

📋 TL;DR

CVE-2021-30167 is an authentication bypass vulnerability in network camera devices that allows authenticated remote attackers to modify URL parameters and escalate privileges to control devices. This affects network camera systems with vulnerable user profile management services. Attackers can gain administrative control over affected devices.

💻 Affected Systems

Products:
  • Merit LILIN network camera devices
Versions: Firmware versions prior to 2021-04-29
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with web management interfaces enabled. Requires authenticated access initially.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to disable security features, access video feeds, modify configurations, and use devices as footholds for network attacks.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, configuration changes, and potential data exfiltration from camera systems.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and regular monitoring in place.

🌐 Internet-Facing: HIGH - Network cameras are often exposed to the internet for remote access, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal attackers with network access could exploit this, but requires initial authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit involves modifying URL parameters in user profile management requests. Requires initial authentication but leads to privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates released April 29, 2021

Vendor Advisory: https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from Merit LILIN support site. 2. Backup current configuration. 3. Upload firmware via web interface. 4. Apply update and restart device. 5. Verify firmware version post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate camera network from critical systems and restrict internet access

Access Control

all

Implement strict authentication policies and disable unnecessary user accounts

🧯 If You Can't Patch

  • Implement network segmentation to isolate camera devices from critical infrastructure
  • Enable logging and monitoring for suspicious authentication and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface. If version is older than April 29, 2021 release, device is vulnerable.

Check Version:

Login to camera web interface and navigate to System > Information to view firmware version

Verify Fix Applied:

Verify firmware version shows post-April 29, 2021 release and test user profile modification attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login
  • User privilege changes in logs
  • Unusual URL parameter modifications in web requests

Network Indicators:

  • HTTP requests with modified user profile parameters
  • Traffic to camera management interfaces from unexpected sources

SIEM Query:

source="camera_logs" AND (event_type="privilege_change" OR url_path="/cgi-bin/manage_user.cgi" AND parameters_modified="true")

🔗 References

📤 Share & Export