CVE-2024-58336

5.3 MEDIUM

📋 TL;DR

Akuvox Smart Intercom S539 devices contain an unauthenticated vulnerability that allows remote attackers to access live video streams without authentication by directly requesting the video.cgi endpoint on port 8080. This affects Akuvox doorphone and intercom devices, potentially exposing private video feeds to unauthorized individuals.

💻 Affected Systems

Products:
  • Akuvox Smart Intercom S539
Versions: All versions prior to patch (specific version information not provided in references)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with the video.cgi endpoint accessible on port 8080. May affect other Akuvox intercom models with similar configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of privacy as attackers can monitor all video feeds from vulnerable devices, potentially capturing sensitive activities, personal information, or security footage.

🟠

Likely Case

Unauthorized surveillance of entry points, allowing attackers to monitor who enters/exits premises, potentially enabling social engineering or physical security bypass.

🟢

If Mitigated

Limited to internal network access only, reducing exposure to authorized personnel within the network perimeter.

🌐 Internet-Facing: HIGH - Devices exposed to the internet can be directly accessed by any remote attacker without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still access video streams, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to video.cgi endpoint on port 8080. No authentication or special tools required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

Check Akuvox official website for firmware updates. Apply latest firmware if available. If no patch exists, implement workarounds.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to port 8080 on affected devices using firewall rules

iptables -A INPUT -p tcp --dport 8080 -j DROP
ufw deny 8080

Network Segmentation

all

Place intercom devices on isolated VLAN separate from sensitive networks

🧯 If You Can't Patch

  • Block port 8080 at network perimeter using firewall rules
  • Disable remote access features if not required
  • Monitor network traffic to port 8080 for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[device_ip]:8080/video.cgi from an unauthenticated session. If video stream loads without authentication, device is vulnerable.

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

After implementing controls, verify that http://[device_ip]:8080/video.cgi returns authentication error or is inaccessible.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /video.cgi without authentication
  • Multiple failed authentication attempts followed by successful video.cgi access

Network Indicators:

  • Unusual traffic to port 8080 from external IPs
  • Video stream data being transmitted to unauthorized destinations

SIEM Query:

source_ip=* AND dest_port=8080 AND uri_path="/video.cgi" AND auth_result="failed"

🔗 References

📤 Share & Export