๐Ÿ” CVE Alert

CVE-2016-15055

UNKNOWN 0.0

JVC VN-T IP-Camera Directory Traversal via check.cgi

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the VN-T216VPRU model) contain a directory traversal vulnerability in the checkcgi endpoint that accepts a user-controlled file parameter. An unauthenticated remote attacker can leverage this vulnerability to read arbitrary files on the device.

CWE CWE-22
Vendor jvc (jvckenwood)
Product ip-camera (vn-t216vpru)
Published Nov 12, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for jvc (jvckenwood) ip-camera (vn-t216vpru)

Be the first to know when new unknown vulnerabilities affecting jvc (jvckenwood) ip-camera (vn-t216vpru) are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

JVC (JVCKENWOOD) / IP-Camera (VN-T216VPRU)
0 < 2016-08-22

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/40282 web.archive.org: https://web.archive.org/web/20170713051843/http://www.black-rose.ml/2016/08/analyzing-security-cameras-products.html pro.jvc.com: http://pro.jvc.com/prof/attributes/tech_desc.jsp?model_id=MDL102145&feature_id=02 vulncheck.com: https://www.vulncheck.com/advisories/jvc-vnt-ip-camera-directory-traversal-via-check-cgi

Credits

Yakir Wizman