"value":"This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.\n\nSuccessful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.\n\n\n\n\n\n\n\n\n\n\n"
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-640 Weak Password Recovery Mechanism for Forgotten Password",
"value":"<p>Update\nMilesight NVR firmware to latest version </p><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.milesight.com/support/download/firmware\">https://www.milesight.com/support/download/firmware</a></p>\n\n\n\n\n\n\n\n<br>"
}
],
"value":"Update\nMilesight NVR firmware to latest version \u00a0\n\n https://www.milesight.com/support/download/firmware https://www.milesight.com/support/download/firmware \n\n\n\n\n\n\n\n\n\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"This vulnerability is reported by Souvik Kandar and Arko Dhar from Redinent Innovations Engineering & Research Team, Karnataka, India."