CVE-2016-15055
JVC VN-T IP-Camera Directory Traversal via check.cgi
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the VN-T216VPRU model) contain a directory traversal vulnerability in the checkcgi endpoint that accepts a user-controlled file parameter. An unauthenticated remote attacker can leverage this vulnerability to read arbitrary files on the device.
| CWE | CWE-22 |
| Vendor | jvc (jvckenwood) |
| Product | ip-camera (vn-t216vpru) |
| Published | Nov 12, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for jvc (jvckenwood) ip-camera (vn-t216vpru)
Be the first to know when new unknown vulnerabilities affecting jvc (jvckenwood) ip-camera (vn-t216vpru) are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
JVC (JVCKENWOOD) / IP-Camera (VN-T216VPRU)
0 < 2016-08-22
References
exploit-db.com: https://www.exploit-db.com/exploits/40282 web.archive.org: https://web.archive.org/web/20170713051843/http://www.black-rose.ml/2016/08/analyzing-security-cameras-products.html pro.jvc.com: http://pro.jvc.com/prof/attributes/tech_desc.jsp?model_id=MDL102145&feature_id=02 vulncheck.com: https://www.vulncheck.com/advisories/jvc-vnt-ip-camera-directory-traversal-via-check-cgi
Credits
Yakir Wizman