Vulnerabilities
Vulnerable Software
Edimax:  >> Ic-3140w Firmware  Security Vulnerabilities
The firmware of EDIMAX IC-3140W Version 3.11 is hardcoded with Administrator username and password.
CVSS Score
9.8
EPSS Score
0.005
Published
2022-06-29
The default administrator account & password of the EDIMAX wireless network camera is hard-coded. Remote attackers can disassemble firmware to obtain the privileged permission and further control the devices.
CVSS Score
7.5
EPSS Score
0.002
Published
2021-04-27
A stack-based buffer-overflow exists in Edimax IP-Camera IC-3116W (v3.06) and IC-3140W (v3.07), which allows an unauthenticated, unauthorized attacker to perform remote-code-execution due to a crafted GET-Request. The overflow occurs in binary ipcam_cgi due to a missing type check in function doGetSysteminfo(). This has been fixed in version: IC-3116W v3.08.
CVSS Score
9.8
EPSS Score
0.044
Published
2020-12-01
An issue was discovered on EDIMAX IC-3140W through 3.06, IC-5150W through 3.09, and IC-6220DC through 3.06 devices. The ipcam_cgi binary contains a stack-based buffer overflow that is possible to trigger from a remote unauthenticated /camera-cgi/public/getsysyeminfo.cgi?action=VALUE_HERE HTTP request: if the VALUE_HERE length is more than 0x400 (1024), it is possible to overwrite other values located on the stack due to an incorrect use of the strcpy() function.
CVSS Score
8.8
EPSS Score
0.003
Published
2018-04-26


Contact Us

Shodan ® - All rights reserved