TP-Link TL-SC3130 1.6.18 Unauthenticated RTSP Stream Disclosure Vulnerability
Title: TP-Link TL-SC3130 1.6.18 Unauthenticated RTSP Stream Disclosure Vulnerability
Advisory ID: ZSL-2018-5497
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (3/5)
Release Date: 17.10.2018
[2] https://packetstormsecurity.com/files/149843
[3] https://www.exploit-db.com/exploits/45632/
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/151628
[18.10.2018] - Added reference [2] and [3]
[20.10.2018] - Added reference [4]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2018-5497
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (3/5)
Release Date: 17.10.2018
Summary
The TL-SC3130G surveillance camera is a versatile solution for your home and office monitoring, whose 54Mbps wireless connectivity enables you to deploy the camera where inaccessible previously by Ethernet connection such as ceiling and walls. This camera can be placed in your living room, office, or anywhere else you would like to keep an eye on things. After a hassle-free installation, you can view and control the camera from a Web browser, bundled software, or compatible cell phone. Besides basic monitoring tools such as motion detection and E-mail alerts which is motion triggered sending an alert when the camera detects movement, advanced features of high availability are also added, such as 2-way audio, dual streaming, and 3GPP compatibility, even the error detection tool 'Ping Watch Dog', making TL-SC3130G an excellent indoor surveillance solution.Description
The TP-Link TL-SC3130 suffers from an unauthenticated and unauthorized live RTSP stream disclosure.Vendor
TP-LINK Technologies Co., Ltd. - http://www.tp-link.comAffected Version
1.6.18P12_121101Tested On
Boa/0.94.14rc21Vendor Status
N/APoC
tplink_tlsc3130_stream.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18428[2] https://packetstormsecurity.com/files/149843
[3] https://www.exploit-db.com/exploits/45632/
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/151628
Changelog
[17.10.2018] - Initial release[18.10.2018] - Added reference [2] and [3]
[20.10.2018] - Added reference [4]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk