Show plain JSON{"id": "CVE-2013-2579", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-10-11T21:55:44.167", "references": [{"url": "http://www.coresecurity.com/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras", "tags": ["Exploit"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-255"}]}], "descriptions": [{"lang": "en", "value": "TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6 have an empty password for the hardcoded \"qmik\" account, which allows remote attackers to obtain administrative access via a TELNET session."}, {"lang": "es", "value": "Las c\u00e1maras IP TP-Link TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, y posiblemente otros modelos anteriores al firmware beta LM.1.6.18P12_sign6 tienen una contrase\u00f1a vac\u00eda para la cuenta incrustada en el c\u00f3digo \"qmik\", lo que permite a atacantes remotos obtener acceso administrativo a trav\u00e9s de una sesion TELNET."}], "lastModified": "2013-10-15T14:11:15.460", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:tp-link:tl-sc3130:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A687292-110A-44B6-91E0-0FA9AA954D1B"}, {"criteria": "cpe:2.3:h:tp-link:tl-sc3130g:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDCDA0C1-4A25-4BD6-8F8C-875D488295CB"}, {"criteria": "cpe:2.3:h:tp-link:tl-sc3171:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DC0738C-300C-4CD4-BB93-AECC15356CB1"}, {"criteria": "cpe:2.3:h:tp-link:tl-sc3171g:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51BA2347-A4EC-45DF-B05A-7806E62FEC3B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:tp-link:lm_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AA9253C-5276-49A9-9097-D9B137829FE8", "versionEndIncluding": "1.6.18p12_sign5"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}