Skip to content
Exploit for downloading backup files from LG Smart IP Devices.
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.

LG Smart IP Camera Backup Download

# Exploit Title: LG Smart IP Device Backup Download
# Date: 09-11-2018
# Exploit Author: Ege Balcı
# Vendor Homepage:
# Model: LNB*/LND*/LNU*/LNV*
# CVE: CVE-2018-16946

LG smart network camera devices are suffering from a broken access control vulnerability. Attackers are able to download certain log and backup files without authenticating into the system. Subject backup files contain user credentials and configuration information for the camera device. A malicious attacker is able to find the out the backup file name via reading the system logs, report data or just by brute-forcing the backup file name pattern.

Known Affected Product List


Following POC exploit bruteforces the backup file name and extracts the users.



Once the target camera user clicks on the "View Report" button inside "Log & Report" page, the subject device generates a system report information file under /updownload/ This file can be downloaded directly without authenticating to system.


This file contains information about the model ID and the version number of the target camera device. When the target camera user generates a system configuration backup by clicking the "Backup" button inside the maintenance page system uses the model ID, version number and the current date to name the backup file. With gathering those information by reading the report data or just by brute forcing the backup file name pattern with publicly known product information, attackers are able to download the backup files with using the download.php?file= endpoint.


Backup file is a compressed sqlite database system configuration informations can be extracted with using sqlite browsers.


You can’t perform that action at this time.