CVE-2023-30146

7.5 HIGH

📋 TL;DR

This vulnerability in Assmann Digitus Plug&View IP Camera HT-IP211HDP allows unauthenticated attackers to download the camera's configuration file containing administrator credentials. Anyone using the affected camera version with network access is vulnerable to credential theft and unauthorized access.

💻 Affected Systems

Products:
  • Assmann Digitus Plug&View IP Camera HT-IP211HDP
Versions: 2.000.022
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All cameras running this firmware version are vulnerable by default when network-accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of the camera, enabling them to view live feeds, modify settings, disable security features, or use the camera as an entry point into the network.

🟠

Likely Case

Attackers steal administrator credentials and access the camera's video feed and settings, potentially compromising privacy and security.

🟢

If Mitigated

With proper network segmentation and access controls, attackers cannot reach the vulnerable interface, preventing credential theft.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires simple HTTP request to specific endpoint; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

Check vendor website for firmware updates; if unavailable, implement workarounds.

🔧 Temporary Workarounds

Network Segmentation

all

Place cameras on isolated VLAN with no internet access and restrict access to management interface.

Firewall Rules

all

Block external access to camera management ports (typically 80, 443, 554).

🧯 If You Can't Patch

  • Isolate cameras from internet and restrict internal access to trusted IPs only.
  • Change default credentials and monitor for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Attempt HTTP GET request to camera IP at endpoint /cgi-bin/ExportSettings.sh; if configuration file downloads without authentication, device is vulnerable.

Check Version:

Check camera web interface or documentation for firmware version; typically displayed in settings.

Verify Fix Applied:

After applying workarounds, verify the endpoint is inaccessible from untrusted networks.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /cgi-bin/ExportSettings.sh from unauthorized IPs
  • Multiple failed login attempts after credential exposure

Network Indicators:

  • Unusual outbound traffic from camera
  • HTTP requests to suspicious endpoints

SIEM Query:

source_ip="camera_ip" AND http_uri="/cgi-bin/ExportSettings.sh"

🔗 References

📤 Share & Export