DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive credentials through an unprotected configuration backup endpoint. Attackers can download the configuration file and extract hardcoded username and password by accessing the /tmpfs/config_backup.bin resource.
DBPower C300 HD Camera - Remote Configuration Disclosure
Problem type
Affected products
DBPower
- - AFFECTED
References
https://www.exploit-db.com/exploits/48095
https://web.archive.org/web/20200620110617/https://donev.eu/blog/dbpower-c300-multiple-vulnerabilities
https://www.vulncheck.com/advisories/dbpower-c-hd-camera-remote-configuration-disclosure
GitHub Security Advisories
GHSA-37vr-rqxp-v3j3
DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows...
https://github.com/advisories/GHSA-37vr-rqxp-v3j3DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive credentials through an unprotected configuration backup endpoint. Attackers can download the configuration file and extract hardcoded username and password by accessing the /tmpfs/config_backup.bin resource.
https://nvd.nist.gov/vuln/detail/CVE-2020-37157
https://web.archive.org/web/20200620110617/https://donev.eu/blog/dbpower-c300-multiple-vulnerabilities
https://www.exploit-db.com/exploits/48095
https://www.vulncheck.com/advisories/dbpower-c-hd-camera-remote-configuration-disclosure
https://github.com/advisories/GHSA-37vr-rqxp-v3j3
JSON source
https://cveawg.mitre.org/api/cve/CVE-2020-37157Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2020-37157",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-02-06T23:14:09.598Z",
"dateReserved": "2026-02-03T16:27:45.310Z",
"datePublished": "2026-02-06T23:14:09.598Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-02-06T23:14:09.598Z"
},
"datePublic": "2020-02-19T00:00:00.000Z",
"title": "DBPower C300 HD Camera - Remote Configuration Disclosure",
"descriptions": [
{
"lang": "en",
"value": "DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive credentials through an unprotected configuration backup endpoint. Attackers can download the configuration file and extract hardcoded username and password by accessing the /tmpfs/config_backup.bin resource."
}
],
"affected": [
{
"vendor": "DBPower",
"product": "DBPower C300 HD Camera",
"versions": [
{
"version": "-",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Missing Authentication for Critical Function",
"cweId": "CWE-306",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/48095",
"name": "ExploitDB-48095",
"tags": [
"exploit"
]
},
{
"url": "https://web.archive.org/web/20200620110617/https://donev.eu/blog/dbpower-c300-multiple-vulnerabilities",
"name": "Archived Researcher Blog",
"tags": [
"technical-description",
"exploit"
]
},
{
"url": "https://www.vulncheck.com/advisories/dbpower-c-hd-camera-remote-configuration-disclosure",
"name": "VulnCheck Advisory: DBPower C300 HD Camera - Remote Configuration Disclosure",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "Todor Donev",
"type": "finder"
}
]
}
}
}