{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T03:13:55.952","vulnerabilities":[{"cve":{"id":"CVE-2014-8389","sourceIdentifier":"cve@mitre.org","published":"2017-12-28T02:29:03.113","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"cgi-bin/mft/wireless_mft.cgi in AirLive BU-2015 with firmware 1.03.18 16.06.2014, AirLive BU-3026 with firmware 1.43 21.08.2014, AirLive MD-3025 with firmware 1.81 21.08.2014, AirLive WL-2000CAM with firmware LM.1.6.18 14.10.2011, and AirLive POE-200CAM v2 with firmware LM.1.6.17.01 uses hard-coded credentials in the embedded Boa web server, which allows remote attackers to obtain user credentials via crafted HTTP requests."},{"lang":"es","value":"cgi-bin/mft/wireless_mft.cgi en AirLive BU-2015 con firmware 1.03.18 16.06.2014, AirLive BU-3026 con firmware 1.43 21.08.2014, AirLive MD-3025 con firmware 1.81 21.08.2014, AirLive WL-2000CAM con firmware LM.1.6.18 14.10.2011 y AirLive POE-200CAM v2 con firmware LM.1.6.17.01 utiliza credenciales embebidas en el servidor web Boa embebido. Esto permite que atacantes remotos obtengan credenciales de usuarios mediante peticiones HTTP manipuladas."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:airlive:bu-3026_firmware:1.43_21.08.2014:*:*:*:*:*:*:*","matchCriteriaId":"87D2B37D-F858-4015-9207-78403D2C059D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:airlive:bu-3026:-:*:*:*:*:*:*:*","matchCriteriaId":"3C4C7544-3A3E-43E4-B635-38BE98B9D268"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:airlive:md-3025_firmware:1.81_21.08.2014:*:*:*:*:*:*:*","matchCriteriaId":"3058FF12-0D14-4BCF-B9B7-A62D0E73053A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:airlive:md-3025:-:*:*:*:*:*:*:*","matchCriteriaId":"2304F05E-CA5F-40CC-ADE2-2268F29A0617"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:airlive:wl-2000cam_firmware:lm.1.6.18_14.10.2011:*:*:*:*:*:*:*","matchCriteriaId":"E099099B-5632-44EF-98EC-A3516A357A9D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:airlive:wl-2000cam:-:*:*:*:*:*:*:*","matchCriteriaId":"DC11BD89-6CE7-401A-8835-84D4B3BBDE37"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:airlive:poe-200cam_v2_firmware:lm.1.6.17.01:*:*:*:*:*:*:*","matchCriteriaId":"ACE2E45F-AB89-400A-A04E-0AE23CC544F5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:airlive:poe-200cam_v2:-:*:*:*:*:*:*:*","matchCriteriaId":"7EA12AAE-E50C-4BBC-801C-98C4F0176269"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:airlive:bu-2015_firmware:1.03.18_16.06.2014:*:*:*:*:*:*:*","matchCriteriaId":"89BEE168-8758-4110-86AF-B9EE71E48FE1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:airlive:bu-2015:-:*:*:*:*:*:*:*","matchCriteriaId":"587B824F-BC55-486B-9357-53C0EBF2E5AE"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/132585/AirLive-Remote-Command-Injection.html","source":"cve@mitre.org","tags":["Exploit","Mitigation","Third Party Advisory","VDB Entry"]},{"url":"http://seclists.org/fulldisclosure/2015/Jul/29","source":"cve@mitre.org","tags":["Exploit","Mailing List","Mitigation","Third Party Advisory"]},{"url":"http://www.securityfocus.com/archive/1/535938/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/75559","source":"cve@mitre.org","tags":["Exploit","Mitigation","Third Party Advisory","VDB Entry"]},{"url":"https://www.coresecurity.com/advisories/airlive-multiple-products-os-command-injection","source":"cve@mitre.org","tags":["Exploit","Mitigation","Technical Description","Third Party Advisory"]},{"url":"http://packetstormsecurity.com/files/132585/AirLive-Remote-Command-Injection.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Third Party Advisory","VDB Entry"]},{"url":"http://seclists.org/fulldisclosure/2015/Jul/29","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mailing List","Mitigation","Third Party Advisory"]},{"url":"http://www.securityfocus.com/archive/1/535938/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/75559","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Third Party Advisory","VDB Entry"]},{"url":"https://www.coresecurity.com/advisories/airlive-multiple-products-os-command-injection","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Technical Description","Third Party Advisory"]}]}}]}