Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Jul 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 01 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files. | |
Title | Hikvision Streaming Media Management Server Default Credentials and Authenticated Arbitrary File Read | |
Weaknesses | CWE-22 CWE-521 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-01T14:48:40.033Z
Updated: 2025-07-01T18:38:53.665Z
Reserved: 2025-04-15T19:15:22.549Z
Link: CVE-2025-34058

Updated: 2025-07-01T18:38:48.655Z

Status : Awaiting Analysis
Published: 2025-07-01T15:15:24.340
Modified: 2025-07-03T15:14:12.767
Link: CVE-2025-34058

No data.