CVE-2020-37157
Published: 07 February 2026
Summary
CVE-2020-37157 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 8.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.
Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.
Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.
Guarantees critical functions are protected by mandatory invocation of the access control mechanism.
Auditing sessions makes it possible to detect access to critical functions without required authentication.
The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.
Certification assesses that critical functions have required authentication controls in place.
Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.
NVD Description
DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive credentials through an unprotected configuration backup endpoint. Attackers can download the configuration file and extract hardcoded username and password by accessing the /tmpfs/config_backup.bin resource.
Deeper analysisAI
CVE-2020-37157 is a configuration disclosure vulnerability (CWE-306) affecting the DBPower C300 HD Camera. The flaw exposes an unprotected configuration backup endpoint at /tmpfs/config_backup.bin, enabling unauthenticated attackers to download the config_backup.bin file and extract hardcoded username and password credentials stored within it.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction or privileges required, as reflected in its CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Exploitation results in high-impact disclosure of sensitive configuration data, potentially allowing attackers to authenticate to the device or pivot to further actions depending on the credentials' scope.
Advisories detail the issue and proof-of-concept exploitation, including a VulnCheck advisory at https://www.vulncheck.com/advisories/dbpower-c-hd-camera-remote-configuration-disclosure, an Exploit-DB entry (https://www.exploit-db.com/exploits/48095), and an archived blog post on multiple DBPower C300 vulnerabilities (https://web.archive.org/web/20200620110617/https://donev.eu/blog/dbpower-c300-multiple-vulnerabilities). No patches or specific mitigations are described in the provided references.
Details
- CWE(s)