JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the VN-T216VPRU model) contain a directory traversal vulnerability in the checkcgi endpoint that accepts a user-controlled file parameter. An unauthenticated remote attacker can leverage this vulnerability to read arbitrary files on the device.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jvckenwood
Jvckenwood vn-t216vpru |
|
| Vendors & Products |
Jvckenwood
Jvckenwood vn-t216vpru |
Wed, 12 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the VN-T216VPRU model) contain a directory traversal vulnerability in the checkcgi endpoint that accepts a user-controlled file parameter. An unauthenticated remote attacker can leverage this vulnerability to read arbitrary files on the device. | |
| Title | JVC VN-T IP-Camera Directory Traversal via check.cgi | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-11-12T22:08:35.468Z
Updated: 2025-11-12T22:08:35.468Z
Reserved: 2025-11-06T22:04:42.838Z
Link: CVE-2016-15055
No data.
Status : Received
Published: 2025-11-12T22:15:41.470
Modified: 2025-11-12T22:15:41.470
Link: CVE-2016-15055
No data.