CVE-2023-30146
📋 TL;DR
This vulnerability in Assmann Digitus Plug&View IP Camera HT-IP211HDP allows unauthenticated attackers to download the camera's configuration file containing administrator credentials. Anyone using the affected camera version with network access is vulnerable to credential theft and unauthorized access.
💻 Affected Systems
- Assmann Digitus Plug&View IP Camera HT-IP211HDP
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative control of the camera, enabling them to view live feeds, modify settings, disable security features, or use the camera as an entry point into the network.
Likely Case
Attackers steal administrator credentials and access the camera's video feed and settings, potentially compromising privacy and security.
If Mitigated
With proper network segmentation and access controls, attackers cannot reach the vulnerable interface, preventing credential theft.
🎯 Exploit Status
Exploit requires simple HTTP request to specific endpoint; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not provided in references
Restart Required: No
Instructions:
Check vendor website for firmware updates; if unavailable, implement workarounds.
🔧 Temporary Workarounds
Network Segmentation
allPlace cameras on isolated VLAN with no internet access and restrict access to management interface.
Firewall Rules
allBlock external access to camera management ports (typically 80, 443, 554).
🧯 If You Can't Patch
- Isolate cameras from internet and restrict internal access to trusted IPs only.
- Change default credentials and monitor for unauthorized access attempts.
🔍 How to Verify
Check if Vulnerable:
Attempt HTTP GET request to camera IP at endpoint /cgi-bin/ExportSettings.sh; if configuration file downloads without authentication, device is vulnerable.
Check Version:
Check camera web interface or documentation for firmware version; typically displayed in settings.
Verify Fix Applied:
After applying workarounds, verify the endpoint is inaccessible from untrusted networks.
📡 Detection & Monitoring
Log Indicators:
- HTTP GET requests to /cgi-bin/ExportSettings.sh from unauthorized IPs
- Multiple failed login attempts after credential exposure
Network Indicators:
- Unusual outbound traffic from camera
- HTTP requests to suspicious endpoints
SIEM Query:
source_ip="camera_ip" AND http_uri="/cgi-bin/ExportSettings.sh"