

Please contact your device manufacturer for more information.
#RAYSHARP DVR PASSWORD SOFTWARE FREE DOWNLOAD UPDATE#
Solution Apply an update if possible Some vendors have released updated firmware to address this issue.

Impact An unauthenticated remote attacker may gain root access to the device. The reporter, Risk Based Security, has provided security advisory with more information. Furthermore, it was previously reported publicly that many of these devices enable remote access via telnet or port 9000 by default. Remote attackers with knowledge of the password may gain root access to the device. According to the reporter, DVR devices based on the Zhuhai RaySharp firmware contain a hard-coded root password. The Vendor List below provides more information on each manufacturer that was reported to be vulnerable. The CERT/CC has not been able to confirm this information directly with Zhuhai RaySharp. Furthermore, it was that many of these devices enable remote access via telnet or port 9000 by default. 3d Physics Simulation Program on this page. Description: Use of Hard-coded Password - CVE-2015-8286 According to the reporter, DVR devices based on the Zhuhai RaySharp firmware contain a hard-coded root password. Overview Digital Video Recorders (DVRs), security cameras, and possibly other devices from multiple vendors use a firmware derived from Zhuhai RaySharp that contains a hard-coded root password.
