mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-29 09:41:13 +00:00
13 lines
1.1 KiB
Markdown
13 lines
1.1 KiB
Markdown
![]() |
## Sinovision Cloud CDN live default passwd
|
||
|
|
||
|
| **Vulnerability** | **Sinovision Cloud CDN live default passwd** |
|
||
|
| :----: | :-----|
|
||
|
| **Chinese name** | 华视私云-CDN直播加速服务器默认口令漏洞 |
|
||
|
| **CVSS core** | 6.5 |
|
||
|
| **FOFA Query** (click to view the results directly)| [body=\"src=\\\"img/dl.gif\\\"\" && title=\"系统登录\" && body=\"华视美达\"](https://en.fofa.info/result?qbase64=Ym9keT0ic3JjPVwiaW1nL2RsLmdpZlwiIiAmJiB0aXRsZT0i57O757uf55m75b2VIiAmJiBib2R5PSLljY7op4bnvo7ovr4i) |
|
||
|
| **Number of assets affected** | 737 |
|
||
|
| **Description** | CDN Live Broadcast Acceleration Server is a server for CDN live broadcast acceleration. The weak password vulnerability exists in the CDN Live broadcast acceleration server. The attacker can use the default password admin/admin to log in to the system background and obtain the background administrator permission. |
|
||
|
| **Impact** | attackers can control the entire platform through default password vulnerabilities and use administrator privileges to operate core functions. |
|
||
|
|
||
|

|