Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1b885ff4336f8f36990d357e3e9ce8e54591bd4457f803762
Public Swagger UI/API detected at path: /swagger.json - sample paths: GET /v1/Admin/staffs/selectAll GET /v1/Admin/users/dashboard GET /v1/Admin/users/selectAll GET /v1/Category/campus/selectAll GET /v1/Category/divisions/selectAll GET /v1/Stock/asset_images/selectAll GET /v1/Stock/asset_inventory/selectAll GET /v1/Stock/assets/selectAll POST /v1/Admin/staffs/delete POST /v1/Admin/staffs/insert POST /v1/Admin/staffs/selectById POST /v1/Admin/staffs/update POST /v1/Admin/users/delete POST /v1/Admin/users/insert POST /v1/Admin/users/login POST /v1/Admin/users/selectById POST /v1/Admin/users/update POST /v1/Category/campus/delete POST /v1/Category/campus/insert POST /v1/Category/campus/selectById POST /v1/Category/campus/update POST /v1/Category/divisions/delete POST /v1/Category/divisions/insert POST /v1/Category/divisions/selectById POST /v1/Category/divisions/update POST /v1/Stock/asset_images/delete POST /v1/Stock/asset_images/insert POST /v1/Stock/asset_images/selectByCondition POST /v1/Stock/asset_images/selectById POST /v1/Stock/asset_images/update POST /v1/Stock/asset_inventory/delete POST /v1/Stock/asset_inventory/insert POST /v1/Stock/asset_inventory/savechecked POST /v1/Stock/asset_inventory/selectByCondition POST /v1/Stock/asset_inventory/selectById POST /v1/Stock/asset_inventory/update POST /v1/Stock/assets/delete POST /v1/Stock/assets/insert POST /v1/Stock/assets/selectByCondition POST /v1/Stock/assets/selectById POST /v1/Stock/assets/update
Severity: info
Fingerprint: 5733ddf49ff49cd1b885ff4336f8f369ca447c2ecb3b8c33db90667985d7647a
Public Swagger UI/API detected at path: /swagger.json - sample paths: GET /v1/Admin/staffs/selectAll GET /v1/Admin/users/selectAll GET /v1/Category/campus/selectAll GET /v1/Category/divisions/selectAll GET /v1/Stock/asset_images/selectAll GET /v1/Stock/asset_inventory/selectAll GET /v1/Stock/assets/selectAll POST /v1/Admin/staffs/delete POST /v1/Admin/staffs/insert POST /v1/Admin/staffs/selectById POST /v1/Admin/staffs/update POST /v1/Admin/users/delete POST /v1/Admin/users/insert POST /v1/Admin/users/login POST /v1/Admin/users/selectById POST /v1/Admin/users/update POST /v1/Category/campus/delete POST /v1/Category/campus/insert POST /v1/Category/campus/selectById POST /v1/Category/campus/update POST /v1/Category/divisions/delete POST /v1/Category/divisions/insert POST /v1/Category/divisions/selectById POST /v1/Category/divisions/update POST /v1/Stock/asset_images/delete POST /v1/Stock/asset_images/insert POST /v1/Stock/asset_images/selectByCondition POST /v1/Stock/asset_images/selectById POST /v1/Stock/asset_images/update POST /v1/Stock/asset_inventory/delete POST /v1/Stock/asset_inventory/insert POST /v1/Stock/asset_inventory/selectByCondition POST /v1/Stock/asset_inventory/selectById POST /v1/Stock/asset_inventory/update POST /v1/Stock/assets/delete POST /v1/Stock/assets/insert POST /v1/Stock/assets/selectByCondition POST /v1/Stock/assets/selectById POST /v1/Stock/assets/update
Severity: info
Fingerprint: 5733ddf49ff49cd1b885ff4336f8f369ca447c2ecb3b8c33db90667981049bca
Public Swagger UI/API detected at path: /swagger.json - sample paths: GET /v1/Admin/staffs/selectAll GET /v1/Admin/users/selectAll GET /v1/Category/campus/selectAll GET /v1/Category/divisions/selectAll GET /v1/Stock/asset_images/selectAll GET /v1/Stock/asset_inventory/selectAll GET /v1/Stock/assets/selectAll POST /v1/Admin/staffs/delete POST /v1/Admin/staffs/insert POST /v1/Admin/staffs/selectById POST /v1/Admin/staffs/update POST /v1/Admin/users/delete POST /v1/Admin/users/insert POST /v1/Admin/users/login POST /v1/Admin/users/selectById POST /v1/Admin/users/update POST /v1/Category/campus/delete POST /v1/Category/campus/insert POST /v1/Category/campus/selectById POST /v1/Category/campus/update POST /v1/Category/divisions/delete POST /v1/Category/divisions/insert POST /v1/Category/divisions/selectById POST /v1/Category/divisions/update POST /v1/Stock/asset_images/delete POST /v1/Stock/asset_images/insert POST /v1/Stock/asset_images/selectById POST /v1/Stock/asset_images/update POST /v1/Stock/asset_inventory/delete POST /v1/Stock/asset_inventory/insert POST /v1/Stock/asset_inventory/selectById POST /v1/Stock/asset_inventory/update POST /v1/Stock/assets/delete POST /v1/Stock/assets/insert POST /v1/Stock/assets/selectById POST /v1/Stock/assets/update
This vulnerability (with proof of concept (PoC) code) affects DVR/NVR devices built using the HiSilicon hi3520d and similar system on a chip (SoC).
Exploiting the vulnerabilities lead to unauthorized remote code execution (RCE) using only the web interface, causing full takeover of the exploited device
Severity: high
Fingerprint: 321975614123c6c05f83e99be00d7104014dcbe9014dcbe9014dcbe9014dcbe9
Found HiSiliconDVR firmware: Hardware: General NBD6808T-PL Vulnerable to multiple issues : LFI, possibly RCE