ID

VAR-201810-0874


CVE

CVE-2018-13114


TITLE

KERUI Wifi Endoscope Camera Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-013981

DESCRIPTION

Missing authentication and improper input validation in KERUI Wifi Endoscope Camera (YPC99) allow an attacker to execute arbitrary commands (with a length limit of 19 characters) via the "ssid" value, as demonstrated by ssid:;ping 192.168.1.2 in the body of a SETSSID command. KERUI Wifi Endoscope Camera (YPC99) Contains an input validation vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. KERUI Wifi Endoscope Camera (YPC99) is a mini endoscope camera. An attacker can use the 'ssid' value to exploit this vulnerability to execute arbitrary commands

Trust: 1.71

sources: NVD: CVE-2018-13114 // JVNDB: JVNDB-2018-013981 // VULHUB: VHN-123141

IOT TAXONOMY

category:['camera device']sub_category:camera

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:keruigroupmodel:ypc99scope:eqversion:*

Trust: 1.0

vendor:keruimodel:ypc99scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-013981 // NVD: CVE-2018-13114

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-13114
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-13114
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201810-1122
value: CRITICAL

Trust: 0.6

VULHUB: VHN-123141
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-13114
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-123141
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-13114
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-123141 // JVNDB: JVNDB-2018-013981 // CNNVD: CNNVD-201810-1122 // NVD: CVE-2018-13114

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.1

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-123141 // JVNDB: JVNDB-2018-013981 // NVD: CVE-2018-13114

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201810-1122

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201810-1122

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013981

PATCH

title:Top Pageurl:http://www.keruistore.com/index.php

Trust: 0.8

sources: JVNDB: JVNDB-2018-013981

EXTERNAL IDS

db:NVDid:CVE-2018-13114

Trust: 2.6

db:JVNDBid:JVNDB-2018-013981

Trust: 0.8

db:CNNVDid:CNNVD-201810-1122

Trust: 0.7

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-123141

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-123141 // JVNDB: JVNDB-2018-013981 // CNNVD: CNNVD-201810-1122 // NVD: CVE-2018-13114

REFERENCES

url:https://utkusen.com/blog/multiple-vulnerabilities-on-kerui-endoscope-camera.html

Trust: 2.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13114

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-13114

Trust: 0.8

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-123141 // JVNDB: JVNDB-2018-013981 // CNNVD: CNNVD-201810-1122 // NVD: CVE-2018-13114

SOURCES

db:OTHERid: -
db:VULHUBid:VHN-123141
db:JVNDBid:JVNDB-2018-013981
db:CNNVDid:CNNVD-201810-1122
db:NVDid:CVE-2018-13114

LAST UPDATE DATE

2025-01-30T22:23:57.117000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-123141date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2018-013981date:2019-03-07T00:00:00
db:CNNVDid:CNNVD-201810-1122date:2020-08-25T00:00:00
db:NVDid:CVE-2018-13114date:2024-11-21T03:46:28.017

SOURCES RELEASE DATE

db:VULHUBid:VHN-123141date:2018-10-22T00:00:00
db:JVNDBid:JVNDB-2018-013981date:2019-03-07T00:00:00
db:CNNVDid:CNNVD-201810-1122date:2018-10-23T00:00:00
db:NVDid:CVE-2018-13114date:2018-10-22T20:29:00.287