Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow authenticated users to execute arbitrary commands as root, as exploited in the wild starting in approximately 2019. A remote and authenticated attacker, possibly using the default admin:tlJwpbo6 credentials, can connect to port 34567 and execute arbitrary operating system commands via a crafted JSON file during an upgrade request. Since at least 2021, Xiongmai has applied patches to prevent attackers from using this mechanism to execute telnetd.
History

Thu, 24 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2022-12-01T00:00:00.000Z

Updated: 2025-04-24T20:09:06.565Z

Reserved: 2022-11-08T00:00:00.000Z

Link: CVE-2022-45045

cve-icon Vulnrichment

Updated: 2024-08-03T14:01:31.484Z

cve-icon NVD

Status : Modified

Published: 2022-12-01T05:15:12.043

Modified: 2025-04-24T20:15:29.603

Link: CVE-2022-45045

cve-icon Redhat

No data.