Rapid7 Vulnerability & Exploit Database

Cisco PVC2300 POE Video Camera configuration download

Back to Search

Cisco PVC2300 POE Video Camera configuration download



This module exploits an information disclosure vulnerability in Cisco PVC2300 cameras in order to download the configuration file containing the admin credentials for the web interface. The module first performs a basic check to see if the target is likely Cisco PVC2300. If so, the module attempts to obtain a sessionID via an HTTP GET request to the vulnerable /oamp/System.xml endpoint using hardcoded credentials. If a session ID is obtained, the module uses it in another HTTP GET request to /oamp/System.xml with the aim of downloading the configuration file. The configuration file, if obtained, is then decoded and saved to the loot directory. Finally, the module attempts to extract the admin credentials to the web interface from the decoded configuration file. No known solution was made available for this vulnerability and no CVE has been published. It is therefore likely that most (if not all) Cisco PVC2300 cameras are affected. This module was successfully tested against several Cisco PVC2300 cameras.


  • Craig Heffner
  • Erik Wynter


Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/gather/cisco_pvc2300_download_config
msf auxiliary(cisco_pvc2300_download_config) > show actions
msf auxiliary(cisco_pvc2300_download_config) > set ACTION < action-name >
msf auxiliary(cisco_pvc2300_download_config) > show options
    ...show and set options...
msf auxiliary(cisco_pvc2300_download_config) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security