Published:2017/08/23  Last Updated:2017/08/23

Multiple vulnerabilities in "Dokodemo eye Smart HD" SCR02HD


Wireless monitor "Dokodemo eye Smart HD" SCR02HD provided by NIPPON ANTENNA Co., Ltd contains multiple vulnerabilities.

Products Affected

  • "Dokodemo eye Smart HD" SCR02HD Firmware and earlier


Wireless monitor "Dokodemo eye Smart HD" SCR02HD provided by NIPPON ANTENNA Co., Ltd contains multiple vulnerabilities listed below.

  • OS command injection (CWE-78) - CVE-2017-10832
    CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 9.8
    CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:P Base Score: 7.5
  • Improper access restriction (CWE-425) - CVE-2017-10833
    CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Base Score: 6.5
    CVSS v2 AV:N/AC:L/Au:N/C:P/I:P/A:N Base Score: 6.4
  • Directory traversal (CWE-22) - CVE-2017-10834
    CVSS v3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Base Score: 4.3
    CVSS v2 AV:N/AC:L/Au:S/C:P/I:N/A:N Base Score: 4.0
  • Arbitrary PHP code execution (CWE-94) - CVE-2017-10835
    CVSS v3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score: 8.8
    CVSS v2 AV:N/AC:L/Au:S/C:P/I:P/A:P Base Score: 6.5


  • An arbitrary OS command may be executed by a remote attacker - CVE-2017-10832
  • Viewing information and modifying of configuration by a remote attacker - CVE-2017-10833
  • An arbitrary local file on the product may be accessed by an authenticated attacker - CVE-2017-10834
  • Arbitrary PHP code on the product may be executed by an authenticated attacker - CVE-2017-10835


Apply a Workaround
The following workarounds may mitigate the affects of the vulnerabilities

  • Change the factory default password.
  • Do not use the product when connected to a public wireless LAN.
  • Restrict direct access to the product by placing a broadband router between the product and external network.

Vendor Status

Vendor Status Last Update Vendor Notes
NIPPON ANTENNA Co., Ltd Vulnerable 2017/08/23 NIPPON ANTENNA Co., Ltd website


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC


Masashi Shiraishi of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2017-10832
JVN iPedia JVNDB-2017-000204