CVE-2022-34540

8.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Digital Watchdog DW MEGApix IP cameras that allows attackers to execute arbitrary commands on the device. The vulnerability affects version A7.2.2_20211029 and is exploitable via a crafted POST request to the /admin/vca/license/license_tok.cgi endpoint. Organizations using these cameras are at risk of device compromise.

💻 Affected Systems

Products:
  • Digital Watchdog DW MEGApix IP cameras
Versions: A7.2.2_20211029
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network access to the camera's web interface. Default credentials may increase risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to camera manipulation, network pivoting, data exfiltration, or participation in botnets.

🟠

Likely Case

Remote code execution allowing camera control, video stream interception, or credential harvesting.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to the web interface. The vulnerability is in a CGI script that processes license tokens.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

Contact Digital Watchdog support for firmware updates. Check vendor website for security advisories.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate IP cameras on separate VLANs with strict firewall rules blocking unnecessary inbound traffic.

Access Control

all

Restrict access to camera web interfaces to authorized management networks only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate cameras from critical networks
  • Monitor for suspicious POST requests to /admin/vca/license/license_tok.cgi

🔍 How to Verify

Check if Vulnerable:

Check camera firmware version via web interface. If version is A7.2.2_20211029, device is vulnerable.

Check Version:

curl -k https://<camera-ip>/cgi-bin/version.cgi 2>/dev/null | grep Firmware

Verify Fix Applied:

Verify firmware has been updated to a version newer than A7.2.2_20211029.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /admin/vca/license/license_tok.cgi with unusual parameters
  • System command execution in web server logs

Network Indicators:

  • Unusual outbound connections from cameras
  • POST requests to license_tok.cgi with shell metacharacters

SIEM Query:

source="web_server" AND uri="/admin/vca/license/license_tok.cgi" AND method="POST" AND (param="license" OR param="token")

🔗 References

📤 Share & Export