CVE-2021-47710

N/A Unknown

📋 TL;DR

This vulnerability in COMMAX Smart Home System allows unauthenticated attackers to retrieve RTSP credentials in plain-text by accessing the /overview.asp endpoint. Attackers can gain access to sensitive information including login credentials and DVR settings. All users of vulnerable COMMAX Smart Home System installations are affected.

💻 Affected Systems

Products:
  • COMMAX Smart Home System
Versions: Specific versions not specified in references, but appears to affect current implementations at time of disclosure (2021)
Operating Systems: Embedded/IoT systems running COMMAX software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the vulnerable endpoint accessible. Likely affects multiple COMMAX smart home and CCTV products.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to RTSP streams, compromise DVR systems, access live camera feeds, and potentially pivot to other network systems using stolen credentials.

🟠

Likely Case

Attackers access RTSP streams to view camera feeds, potentially compromising privacy and security of monitored areas.

🟢

If Mitigated

If properly segmented and behind firewalls, impact is limited to unauthorized access to camera streams only.

🌐 Internet-Facing: HIGH - Exploitation requires only a simple HTTP GET request and no authentication, making internet-facing systems extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems can still exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to /overview.asp endpoint returns credentials. Exploit code available on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not found in provided references

Restart Required: No

Instructions:

Check COMMAX website for security updates. No specific patch instructions available from provided references.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate COMMAX systems from internet and restrict access to trusted networks only

Access Control

linux

Implement firewall rules to block external access to the vulnerable endpoint

iptables -A INPUT -p tcp --dport 80 -s ! TRUSTED_NETWORK -j DROP
iptables -A INPUT -p tcp --dport 443 -s ! TRUSTED_NETWORK -j DROP

🧯 If You Can't Patch

  • Remove internet-facing access completely - place behind VPN or air-gapped network
  • Change all RTSP and system credentials immediately and monitor for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Send GET request to http://[target_ip]/overview.asp and check if RTSP credentials are returned in plain-text

Check Version:

Check device web interface or contact COMMAX support for version information

Verify Fix Applied:

After applying workarounds, verify the endpoint is no longer accessible or returns error/authentication required

📡 Detection & Monitoring

Log Indicators:

  • Multiple GET requests to /overview.asp from unauthorized IPs
  • Failed authentication attempts following credential disclosure

Network Indicators:

  • Unusual RTSP stream access from new IP addresses
  • HTTP requests to /overview.asp from external networks

SIEM Query:

sourceIP=* destIP=COMMAX_DEVICE (http_method=GET AND uri_path="/overview.asp")

🔗 References

📤 Share & Export