Threat Encyclopedia



This indicates detection of an attempted scan to access configuration files on a unprotected DVR devices.
As access to such files are usually restricted, attempts to access the file might indicates a recon attempt by a malicious actor.

affected-products-logoAffected Products

Vulnerable DVR devices

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Monitor the traffic from that network for any suspicious activity.

CVE References


Telemetry logoTelemetry