CVE-2024-45171: n/a
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper user input validation, it is possible to upload dangerous files, for instance PHP code, to the C-MOR system. By analyzing the C-MOR web interface, it was found out that the upload functionality for backup files allows an authenticated user to upload arbitrary files. The only condition is that the filename contains a .cbkf string. Therefore, webshell.cbkf.php is considered a valid file name for the C-MOR web application. Uploaded files are stored within the directory "/srv/www/backups" on the C-MOR system, and can thus be accessed via the URL https://<HOST>/backup/upload_<FILENAME>. Due to broken access control, low-privileged authenticated users can also use this file upload functionality.
AI Analysis
Technical Summary
CVE-2024-45171 is a critical vulnerability identified in the za-internet C-MOR Video Surveillance system version 5.2401, stemming from improper user input validation and broken access control in the backup file upload functionality. The system allows authenticated users, even those with low privileges, to upload arbitrary files as long as the filename contains the string '.cbkf'. This loophole permits attackers to upload malicious PHP files disguised with the '.cbkf' substring, such as 'webshell.cbkf.php'. These files are stored in the '/srv/www/backups' directory, which is accessible via the web interface at URLs like https://<HOST>/backup/upload_<FILENAME>. Because the directory is web-accessible, attackers can execute uploaded PHP webshells remotely, leading to full remote code execution on the server. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). Exploitation requires authentication but no additional user interaction, and the attack surface includes any authenticated user, even those with minimal privileges, due to broken access control. The CVSS v3.1 score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk to organizations relying on this surveillance system for security monitoring.
Potential Impact
The exploitation of CVE-2024-45171 can have severe consequences for affected organizations. Attackers gaining remote code execution can compromise the confidentiality of surveillance footage and sensitive data, manipulate or delete video records, and disrupt the availability of the surveillance system, potentially blinding physical security monitoring. The ability for low-privileged users to escalate privileges or execute arbitrary code increases the risk of lateral movement within the network, leading to broader compromise. This can result in unauthorized surveillance, data breaches, and operational downtime. Given the critical role of video surveillance in physical security, exploitation could also facilitate physical intrusions or sabotage. Organizations in sectors such as critical infrastructure, government, transportation, and large enterprises using C-MOR systems are particularly at risk. The lack of known patches or mitigations at the time of disclosure further elevates the threat level.
Mitigation Recommendations
To mitigate CVE-2024-45171, organizations should immediately restrict access to the backup file upload functionality to only highly trusted administrators and disable it if not essential. Implement strict server-side validation to reject any uploaded files containing executable extensions or suspicious substrings like '.php' regardless of filename. Employ web application firewalls (WAFs) to detect and block attempts to upload or access malicious files in the '/srv/www/backups' directory. Monitor web server logs for unusual access patterns to backup upload URLs and uploaded filenames. Segregate the backup upload directory from the web root or configure the web server to deny execution of scripts in this directory. Enforce the principle of least privilege by reviewing user roles and removing unnecessary upload permissions from low-privileged users. Regularly audit and update the C-MOR system software and apply vendor patches once available. Consider network segmentation to isolate surveillance systems from critical infrastructure to limit lateral movement in case of compromise.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, China, India, Australia, Canada
CVE-2024-45171: n/a
Description
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper user input validation, it is possible to upload dangerous files, for instance PHP code, to the C-MOR system. By analyzing the C-MOR web interface, it was found out that the upload functionality for backup files allows an authenticated user to upload arbitrary files. The only condition is that the filename contains a .cbkf string. Therefore, webshell.cbkf.php is considered a valid file name for the C-MOR web application. Uploaded files are stored within the directory "/srv/www/backups" on the C-MOR system, and can thus be accessed via the URL https://<HOST>/backup/upload_<FILENAME>. Due to broken access control, low-privileged authenticated users can also use this file upload functionality.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45171 is a critical vulnerability identified in the za-internet C-MOR Video Surveillance system version 5.2401, stemming from improper user input validation and broken access control in the backup file upload functionality. The system allows authenticated users, even those with low privileges, to upload arbitrary files as long as the filename contains the string '.cbkf'. This loophole permits attackers to upload malicious PHP files disguised with the '.cbkf' substring, such as 'webshell.cbkf.php'. These files are stored in the '/srv/www/backups' directory, which is accessible via the web interface at URLs like https://<HOST>/backup/upload_<FILENAME>. Because the directory is web-accessible, attackers can execute uploaded PHP webshells remotely, leading to full remote code execution on the server. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). Exploitation requires authentication but no additional user interaction, and the attack surface includes any authenticated user, even those with minimal privileges, due to broken access control. The CVSS v3.1 score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk to organizations relying on this surveillance system for security monitoring.
Potential Impact
The exploitation of CVE-2024-45171 can have severe consequences for affected organizations. Attackers gaining remote code execution can compromise the confidentiality of surveillance footage and sensitive data, manipulate or delete video records, and disrupt the availability of the surveillance system, potentially blinding physical security monitoring. The ability for low-privileged users to escalate privileges or execute arbitrary code increases the risk of lateral movement within the network, leading to broader compromise. This can result in unauthorized surveillance, data breaches, and operational downtime. Given the critical role of video surveillance in physical security, exploitation could also facilitate physical intrusions or sabotage. Organizations in sectors such as critical infrastructure, government, transportation, and large enterprises using C-MOR systems are particularly at risk. The lack of known patches or mitigations at the time of disclosure further elevates the threat level.
Mitigation Recommendations
To mitigate CVE-2024-45171, organizations should immediately restrict access to the backup file upload functionality to only highly trusted administrators and disable it if not essential. Implement strict server-side validation to reject any uploaded files containing executable extensions or suspicious substrings like '.php' regardless of filename. Employ web application firewalls (WAFs) to detect and block attempts to upload or access malicious files in the '/srv/www/backups' directory. Monitor web server logs for unusual access patterns to backup upload URLs and uploaded filenames. Segregate the backup upload directory from the web root or configure the web server to deny execution of scripts in this directory. Enforce the principle of least privilege by reviewing user roles and removing unnecessary upload permissions from low-privileged users. Regularly audit and update the C-MOR system software and apply vendor patches once available. Consider network segmentation to isolate surveillance systems from critical infrastructure to limit lateral movement in case of compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ce8b7ef31ef0b56a195
Added to database: 2/25/2026, 9:43:04 PM
Last enriched: 2/26/2026, 8:07:54 AM
Last updated: 4/12/2026, 3:40:18 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.