The web server of the E1 Zoom camera through 3.0.0.716...
High severity
Unreviewed
Published
Jul 18, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jul 17, 2022
Published to the GitHub Advisory Database
Jul 18, 2022
Last updated
Jan 27, 2023
The web server of the E1 Zoom camera through 3.0.0.716 discloses its configuration via the /conf/ directory that is mapped to a publicly accessible path. In this way an attacker can download the entire NGINX/FastCGI configurations by querying the /conf/nginx.conf or /conf/fastcgi.conf URI.
References