NUUO NVRmini2 Network Video Recorder firmware through 3.9.1 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow), resulting in ability to read camera feeds or reconfigure the device.
Max CVSS
10.0
EPSS Score
18.34%
Published
2018-12-05
Updated
2019-06-04

CVE-2018-17936

Public exploit
NUUO CMS All versions 3.3 and prior the application allows the upload of arbitrary files that can modify or overwrite configuration files to the server, which could allow remote code execution.
Max CVSS
9.8
EPSS Score
4.59%
Published
2018-11-27
Updated
2019-10-09

CVE-2018-17934

Public exploit
NUUO CMS All versions 3.3 and prior the application allows external input to construct a pathname that is able to be resolved outside the intended directory. This could allow an attacker to impersonate a legitimate user, obtain restricted information, or execute arbitrary code.
Max CVSS
9.8
EPSS Score
17.92%
Published
2018-11-27
Updated
2019-10-09
NUUO CMS all versions 3.1 and prior, The application implements a method of user account control that causes standard account security features to not be utilized as intended, which could allow user account compromise and may allow for remote code execution.
Max CVSS
8.8
EPSS Score
0.38%
Published
2018-10-12
Updated
2019-10-09

CVE-2018-17888

Public exploit
NUUO CMS all versions 3.1 and prior, The application uses a session identification mechanism that could allow attackers to obtain the active session ID, which could allow arbitrary remote code execution.
Max CVSS
9.8
EPSS Score
2.92%
Published
2018-10-12
Updated
2019-10-09
cgi_system in NUUO's NVRMini2 3.8.0 and below allows remote attackers to execute arbitrary code via crafted HTTP requests.
Max CVSS
10.0
EPSS Score
7.01%
Published
2018-09-19
Updated
2018-12-07
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!