Zero-day vulnerability in DHD216A

Use of hard-coded credentials

The vulnerability exploitation was uncovered by 360Netlab in August 2019.  Several attack groups were using vulnerabilities in Lilin DVR firmware spread Chalubo, FBot, and Moobot botnets.

Known malware:

Chalubo, FBot, Moobot

Vulnerability details

Advisory: SB2020032101 - Multiple vulnerabilities in Merit LILIN DVR devices

Vulnerable component: DHD216A

CVE-ID:

CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-798 - Use of Hard-coded Credentials

Description:

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Hard-coded accounts:

root/icatch99
report/8Jg0SR8K50

Note, this vulnerability is being actively exploited in the wild since August 2019.

External links:

https://blog.netlab.360.com/multiple-botnets-are-spreading-using-lilin-dvr-0-day-en/