{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T18:50:41.101","vulnerabilities":[{"cve":{"id":"CVE-2019-10711","sourceIdentifier":"cve@mitre.org","published":"2019-04-23T20:32:43.087","lastModified":"2024-11-21T04:19:47.173","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Incorrect access control in the RTSP stream and web portal on all IP cameras based on Hisilicon Hi3510 firmware (until Webware version V1.0.1) allows attackers to view an RTSP stream by connecting to the stream with hidden credentials (guest or user) that are neither displayed nor configurable in the camera's CamHi or keye mobile management application. This affects certain devices labeled as HI3510, HI3518, LOOSAFE, LEVCOECAM, Sywstoda, BESDER, WUSONGLUSAN, GADINAN, Unitoptek, ESCAM, etc."},{"lang":"es","value":"El control de acceso incorrecto en el flujo RTSP y en el portal web de todas las cámaras IP con firmware Hisilicon Hi3510 (hasta la versión de Webware V1.0.1), permite a los atacantes ver una transmisión RTSP conectándose a una transmisión con credenciales ocultas (invitado o usuario) que no se muestran ni se pueden configurar en la aplicación de gestión CamHi o keye mobile de la cámara. Esto afecta a ciertos dispositivos etiquetados como HI3510, HI3518, LOOSAFE, LEVCOECAM, Sywstoda, BESDER, WUSONGLUSAN, GADINAN, Unitoptek, ESCAM, etc."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hisilicon:hi3510_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.1","matchCriteriaId":"871A2013-BA46-4EFC-B378-680947FB8DA5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hisilicon:hi3510:-:*:*:*:*:*:*:*","matchCriteriaId":"862E0003-FAE8-4759-889F-F09597219164"}]}]}],"references":[{"url":"https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}