CVE-2021-47710
📋 TL;DR
This vulnerability in COMMAX Smart Home System allows unauthenticated attackers to retrieve RTSP credentials in plain-text by accessing the /overview.asp endpoint. Attackers can gain access to sensitive information including login credentials and DVR settings. All users of vulnerable COMMAX Smart Home System installations are affected.
💻 Affected Systems
- COMMAX Smart Home System
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full access to RTSP streams, compromise DVR systems, access live camera feeds, and potentially pivot to other network systems using stolen credentials.
Likely Case
Attackers access RTSP streams to view camera feeds, potentially compromising privacy and security of monitored areas.
If Mitigated
If properly segmented and behind firewalls, impact is limited to unauthorized access to camera streams only.
🎯 Exploit Status
Simple HTTP GET request to /overview.asp endpoint returns credentials. Exploit code available on Exploit-DB.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not found in provided references
Restart Required: No
Instructions:
Check COMMAX website for security updates. No specific patch instructions available from provided references.
🔧 Temporary Workarounds
Network Segmentation
allIsolate COMMAX systems from internet and restrict access to trusted networks only
Access Control
linuxImplement firewall rules to block external access to the vulnerable endpoint
iptables -A INPUT -p tcp --dport 80 -s ! TRUSTED_NETWORK -j DROP
iptables -A INPUT -p tcp --dport 443 -s ! TRUSTED_NETWORK -j DROP
🧯 If You Can't Patch
- Remove internet-facing access completely - place behind VPN or air-gapped network
- Change all RTSP and system credentials immediately and monitor for unauthorized access
🔍 How to Verify
Check if Vulnerable:
Send GET request to http://[target_ip]/overview.asp and check if RTSP credentials are returned in plain-text
Check Version:
Check device web interface or contact COMMAX support for version information
Verify Fix Applied:
After applying workarounds, verify the endpoint is no longer accessible or returns error/authentication required
📡 Detection & Monitoring
Log Indicators:
- Multiple GET requests to /overview.asp from unauthorized IPs
- Failed authentication attempts following credential disclosure
Network Indicators:
- Unusual RTSP stream access from new IP addresses
- HTTP requests to /overview.asp from external networks
SIEM Query:
sourceIP=* destIP=COMMAX_DEVICE (http_method=GET AND uri_path="/overview.asp")