Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-47970 | Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow authenticated users to execute arbitrary commands as root, as exploited in the wild starting in approximately 2019. A remote and authenticated attacker, possibly using the default admin:tlJwpbo6 credentials, can connect to port 34567 and execute arbitrary operating system commands via a crafted JSON file during an upgrade request. Since at least 2021, Xiongmai has applied patches to prevent attackers from using this mechanism to execute telnetd. |
| Link | Providers |
|---|---|
| https://vulncheck.com/blog/xiongmai-iot-exploitation |
|
Thu, 24 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-24T20:09:06.565Z
Reserved: 2022-11-08T00:00:00.000Z
Link: CVE-2022-45045
Updated: 2024-08-03T14:01:31.484Z
Status : Modified
Published: 2022-12-01T05:15:12.043
Modified: 2025-04-24T20:15:29.603
Link: CVE-2022-45045
No data.
OpenCVE Enrichment
No data.
EUVD