diff --git a/Sinovision_Cloud_CDN_live_default_passwd.md b/Sinovision_Cloud_CDN_live_default_passwd.md new file mode 100644 index 0000000..1f609ff --- /dev/null +++ b/Sinovision_Cloud_CDN_live_default_passwd.md @@ -0,0 +1,12 @@ +## Sinovision Cloud CDN live default passwd + +| **Vulnerability** | **Sinovision Cloud CDN live default passwd** | +| :----: | :-----| +| **Chinese name** | 华视私云-CDN直播加速服务器默认口令漏洞 | +| **CVSS core** | 6.5 | +| **FOFA Query** (click to view the results directly)| [body=\"src=\\\"img/dl.gif\\\"\" && title=\"系统登录\" && body=\"华视美达\"](https://en.fofa.info/result?qbase64=Ym9keT0ic3JjPVwiaW1nL2RsLmdpZlwiIiAmJiB0aXRsZT0i57O757uf55m75b2VIiAmJiBib2R5PSLljY7op4bnvo7ovr4i) | +| **Number of assets affected** | 737 | +| **Description** | CDN Live Broadcast Acceleration Server is a server for CDN live broadcast acceleration. The weak password vulnerability exists in the CDN Live broadcast acceleration server. The attacker can use the default password admin/admin to log in to the system background and obtain the background administrator permission. | +| **Impact** | attackers can control the entire platform through default password vulnerabilities and use administrator privileges to operate core functions. | + +![](https://s3.bmp.ovh/imgs/2023/05/12/2d290c42299026fa.gif)