CVE-2023-33443

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass access controls in BESDER IP camera administrative functions, enabling execution of arbitrary administrative commands. Attackers can send crafted payloads to unprotected endpoints to gain full control of affected devices. All users of BESDER IP cameras running vulnerable VideoPlayTool software are affected.

💻 Affected Systems

Products:
  • BESDER IP cameras with VideoPlayTool software
Versions: v2.0.1.0
Operating Systems: Embedded Linux systems on BESDER cameras
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects BES-6024PB-I50H1 model but may impact other BESDER models using same VideoPlayTool software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of IP camera system allowing attackers to execute arbitrary commands, access video feeds, modify configurations, install malware, or use device as pivot point into internal networks.

🟠

Likely Case

Unauthorized administrative access leading to camera control, video feed interception, configuration changes, and potential device takeover for botnet participation.

🟢

If Mitigated

No impact if proper network segmentation, access controls, and authentication mechanisms are implemented to restrict administrative access.

🌐 Internet-Facing: HIGH - IP cameras are often exposed to internet for remote access, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access, but requires local network presence.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on GitLab showing direct access to administrative endpoints without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Check BESDER website for firmware updates or contact vendor support.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate IP cameras on separate VLAN with strict firewall rules blocking external access to administrative interfaces.

Access Control Lists

all

Implement strict IP-based access controls to limit administrative interface access to trusted management networks only.

🧯 If You Can't Patch

  • Remove cameras from internet-facing networks and place behind VPN for remote access
  • Implement network monitoring for unusual administrative traffic to camera endpoints

🔍 How to Verify

Check if Vulnerable:

Check if VideoPlayTool v2.0.1.0 is installed on BESDER cameras. Attempt to access administrative endpoints without authentication.

Check Version:

Check camera web interface or console for VideoPlayTool version information

Verify Fix Applied:

Verify administrative endpoints require proper authentication and reject unauthorized command execution attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to administrative endpoints
  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful administrative access

Network Indicators:

  • HTTP requests to administrative endpoints from untrusted sources
  • Unusual outbound connections from camera devices
  • Traffic patterns indicating command injection

SIEM Query:

source_ip NOT IN trusted_networks AND dest_port=80 AND uri CONTAINS '/admin/' OR uri CONTAINS 'VideoPlayTool'

🔗 References

📤 Share & Export