


Perceptive Security
SOC/SIEM Consultancy

Denver SHC-150 Smart Wifi Camera contains a hardcoded telnet credential vulnerability that allows unauthenticated attackers to access a Linux shell. Attackers c…
Published:
15 januari 2026 om 23:00:00
Alert date:
16 januari 2026 om 01:13:28
Source:
nvd.nist.gov
Mobile & IoT
Denver SHC-150 Smart Wifi Camera contains a critical hardcoded telnet credential vulnerability (CVE-2021-47796) that allows unauthenticated remote attackers to gain access to a Linux shell on the device. Attackers can exploit this vulnerability by connecting to port 23 using default credentials, enabling them to execute arbitrary commands on the camera's operating system. This represents a complete compromise of the IoT device, allowing full system control without any authentication requirements. The vulnerability affects the Denver SHC-150 model and has been documented with proof-of-concept exploits available publicly.
Technical details
Mitigation steps:
Affected products:
Denver SHC-150 Smart Wifi Camera
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2021-47796
http://old.denver.eu/products/smart-home-security/ip-camera-/indoor/c-1024/c-1245
https://www.exploit-db.com/exploits/50160
https://www.vulncheck.com/advisories/denver-smart-wifi-camera-shc-telnet-remote-code-execution-rce
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
