CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
20.0%
A vulnerability has been found in Dahua products.After obtaining the administrator’s username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing device initialization.
Vendor | Product | Version | CPE |
---|---|---|---|
dahuasecurity | nvr4104-4ks2\/l_firmware | * | cpe:2.3:o:dahuasecurity:nvr4104-4ks2\/l_firmware:*:*:*:*:*:*:*:* |
dahuasecurity | nvr4104-4ks2\/l | - | cpe:2.3:h:dahuasecurity:nvr4104-4ks2\/l:-:*:*:*:*:*:*:* |
dahuasecurity | nvr4108-4ks2\/l_firmware | 4.003.0000000.1.r.240515 | cpe:2.3:o:dahuasecurity:nvr4108-4ks2\/l_firmware:4.003.0000000.1.r.240515:*:*:*:*:*:*:* |
dahuasecurity | nvr4108-4ks2\/l | - | cpe:2.3:h:dahuasecurity:nvr4108-4ks2\/l:-:*:*:*:*:*:*:* |
dahuasecurity | nvr4116-4ks2\/l_firmware | * | cpe:2.3:o:dahuasecurity:nvr4116-4ks2\/l_firmware:*:*:*:*:*:*:*:* |
dahuasecurity | nvr4116-4ks2\/l | - | cpe:2.3:h:dahuasecurity:nvr4116-4ks2\/l:-:*:*:*:*:*:*:* |
dahuasecurity | nvr4104-p-4ks2\/l_firmware | * | cpe:2.3:o:dahuasecurity:nvr4104-p-4ks2\/l_firmware:*:*:*:*:*:*:*:* |
dahuasecurity | nvr4104-p-4ks2\/l | - | cpe:2.3:h:dahuasecurity:nvr4104-p-4ks2\/l:-:*:*:*:*:*:*:* |
dahuasecurity | nvr4108-p-4ks2\/l_firmware | * | cpe:2.3:o:dahuasecurity:nvr4108-p-4ks2\/l_firmware:*:*:*:*:*:*:*:* |
dahuasecurity | nvr4108-p-4ks2\/l | - | cpe:2.3:h:dahuasecurity:nvr4108-p-4ks2\/l:-:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"product": "NVR4XXX",
"vendor": "Dahua",
"versions": [
{
"status": "affected",
"version": "NVR4XXX Versions which Build time before 2023/12/13"
}
]
}
]