Sunday, November 27, 2016

Telnet into VSTARCAM T6835WIP PnP IP Network Camera


Given Mirai malware was interested in my vulnerability and found the password on a russian web site (thanks google translate).  If I can figure it out then the "bad guys" already have it.  Therefore I feel comfortable sharing so folks can actually do something about it (i.e. change the password)

login: root
password: 2011vsta

on a windows 10 machine, used Putty

Host name: 192.168.0.192
Connection type: Telnet
Port: 23



typing in busbox at the # lists available functions
use chpasswd to change password

# chpasswd (enter chpasswd at #)
root:newpassword (on blank line enter root:'newpassword'

should get response
Password for 'root' changed

hit enter and ignore the message
chpasswd: missing new password

1 comment:

Jared said...

This usually doesn't survive a reboot... If yours did you are lucky...

Also with these things an insecure telnet server is probably the least of your worries... They often have a ton of other things that let you get credentials and run things as root via the web interface...