Ezviz - Bug Bounty Program
Established in 2013, EZVIZ dedicates itself to creating a safe, convenient and smart life for users through its intelligent devices, advanced AI technologies and cloud services.
Reward
Program
Hacktivity
About
EZVIZ
- Established in 2013, EZVIZ dedicates itself to create a safe, convenient and smart life for worldwide users through our IoT Products, advanced technologies and cloud services.
Program Rules
Thank you for your interest in EZVIZ bug bounty program.
- We believe that no technology is perfect and that working with skilled security researchers is crucial in identifying weaknesses in our Products or Services.
- If you believe you've found a security bug relating to us, we are happy to work with you to resolve the issue promptly and ensure you are fairly rewarded for your discovery.
Vulnerability Classification
Critical Vulnerabilities
- Ability to access any user's camera for live video streaming or playback.
- Full access to the database of core applications.
- Direct vulnerabilities to obtain core system permissions, including but not limited to:
- Command injection
- Remote command execution
- Web shell upload
- SQL injection leading to system permissions
- Buffer overflows (including exploitable ActiveX buffer overflows)
- Remote kernel code execution vulnerabilities
- Other remote code execution vulnerabilities caused by logic flaws (assessed based on the confirmed permissions obtained).
- Severe information leaks, including but not limited to:
- SQL injection vulnerabilities in core databases
- Exposing three or more sensitive information fields
- Affecting a significant amount of data (≥100,000 records).
- If not meeting these thresholds, scoring will be adjusted based on the actual scenario.
- Sensitive fields: Personal names, ID numbers, addresses, contact information, bank account numbers, full transaction details, etc.
- Major logic design flaws, including but not limited to:
- Arbitrary account login
- Password reset
- Unauthorized financial transactions
- Payment processing issues.
High-Risk Vulnerabilities
- Vulnerabilities that directly provide general system permissions, including but not limited to:
- Command injection
- Remote command execution
- Web shell upload
- SQL injection leading to system permissions
- Buffer overflows (including exploitable ActiveX buffer overflows)
- Remote kernel code execution vulnerabilities
- Other remote code execution vulnerabilities caused by logic flaws (assessed based on the confirmed permissions obtained).
- Sensitive information leaks, including but not limited to:
- SQL injection vulnerabilities in non-core databases
- Exposing three or more sensitive information fields
- Affecting a significant amount of data (≥10,000 records).
- If not meeting these thresholds, scoring will be adjusted based on the actual scenario.
- Sensitive fields: Personal names, ID numbers, addresses, contact information, bank account numbers, full transaction details, etc.
- SSRF vulnerabilities that allow direct access to the internal network with complete response feedback.
- Privilege escalation, including but not limited to:
- Unauthorized modifications of important information
- Bypassing authentication to access administrative backends
- Modifying critical business configurations (evaluated based on actual business scenarios).
Medium-Risk Vulnerabilities
- Vulnerabilities enabling the direct theft of user identity information, including:
- Stored XSS vulnerabilities on critical pages
- SQL injection vulnerabilities on standard websites.
- Unauthorized access, including but not limited to:
- Bypassing restrictions on normal interfaces to modify user data
- Performing user operations
- Weak administrative passwords (evaluated based on actual business scenarios).
- Ordinary information leaks, including but not limited to:
- Internal source code package leaks
- Cloud platform key exposure
- Vulnerabilities with proven exploitability and significant impact
- Leaking a certain amount of personal sensitive information (scored based on actual scenarios).
- Exploitable communication protocol vulnerabilities or business logic flaws with some level of impact.
Low-Risk Vulnerabilities
- Vulnerabilities requiring user interaction to obtain identity information, including but not limited to:
- Reflected XSS (including reflected DOM-XSS)
- JSON hijacking
- CSRF in sensitive operations
- Stored XSS in standard business processes.
- Minor logical design flaws, including but not limited to:
- Bypassing SMS verification codes
- Email verification bypass
- Brute-forcing SMS codes
- SMS bombing.
- Minor information leakage vulnerabilities, including but not limited to:
- Internal system source code leaks on GitHub
phpinfo
leaks- Logcat-sensitive information leaks
- Correct internal account credentials.
- Hard-to-exploit issues that may pose potential security risks, including but not limited to:
- Self-XSS
- CSRF for non-critical operations
- File parsing vulnerabilities.
- Minor unauthorized access vulnerabilities, including but not limited to:
- Unauthorized operations on non-core functional interfaces (evaluated based on actual business scenarios).
No Impact
- Non-security-related bugs, such as:
- Webpage garbling
- Functional defects
- Styling issues.
- Non-exploitable "vulnerabilities," including but not limited to:
- Scanner reports with no practical significance (e.g., low-version web servers)
- Self-XSS
- HTML Injection
- JSON hijacking without sensitive data
- CSRF without sensitive operations
- Meaningless source code leaks
- Internal IP/domain leaks
- Logcat information leaks without sensitive data.
- Low-risk or hard-to-exploit vulnerabilities, such as:
- PDF XSS
- URL redirection
- Email bombing
- SSRF that cannot access internal networks
- Username enumeration
- Concurrent requests affecting insignificant data (e.g., page views, sign-up numbers, unimportant likes/ratings)
- Meaningless API key leaks
- Command execution vulnerabilities providing only
dnslog
feedback.
- Other issues not directly demonstrating a vulnerability, including user speculation.
- Non-reproducible vulnerabilities confirmed by YSRC personnel as irreproducible.
- Previously known vulnerabilities that will be ignored, with the submitter informed via the submission platform.
- Non-business-related vulnerabilities not affecting core products or caused by non-core product security issues.
- Vulnerabilities in test, pre-release, or private cloud demo environments (e.g., domains starting with
t
,test
,pb
, etc.) unless proven to affect production environments. - Local denial-of-service vulnerabilities in mobile clients, including those caused by component permissions.
Reward Eligibility and Responsible Disclosure
We are happy to thank everyone who submits valid reports which help us improve the security of EZVIZ, however only those that meet the following eligibility requirements may receive a monetary reward:
- You must be the first reporter of a vulnerability.
- The vulnerability must be a qualifying vulnerability (see below).
- "OneFixOneReward": If two or more endpoints use the same codebase and a single fix can be deployed to fix all the different endpoints, only one endpoint will be considered as eligible for a reward and other reports will be closed as Informative. Regardless, such reports will be reviewed on a case by case basis.
- You must send a clear textual description of the report along with steps to reproduce the issue, include attachments such as screenshots or proof of concept code as necessary.
- You must avoid tests that could cause degradation or interruption of our service systems (refrain from using automated tools, and limit yourself about requests per second).
- You must not leak, manipulate, or destroy any user data.
- You must not be a former or current employee of EZVIZ or one of its contractors.
- Our analysis is always based on worst case exploitation of the vulnerability, as is the reward we pay.
- No vulnerability disclosure, including partial is allowed.
Testing Policy
Please test vulnerabilities only against your own accounts. Only use authorized accounts so as not to inadvertently compromise the security or privacy of our users.
- Avoid tests that could cause degradation or interruption of our service systems.
- Do not use automated scanners or tools that generate large amount of network traffic.
- Do not leak, manipulate, or destroy any user data or files in any system.
- Do not copy any files from the system or disclose them.
Reward
Asset value | CVSS | CVSS | CVSS | CVSS |
---|---|---|---|---|
$100 | $500 | $1,000 | $3,000 | |
$15 | $100 | $600 | $1,400 | |
$10 | $50 | $300 | $700 |
Scopes
Scope | Type | Asset value | Expand rewards grid |
---|---|---|---|
Hardware found on https://www.ezviz.com/category/security-wifi-cameras | other | ||
Low Medium High Critical | |||
Hardware found on https://www.ezviz.com/category/smart-home | other | ||
Low Medium High Critical | |||
i.ys7.com | web-application | ||
Low Medium High Critical | |||
open.ys7.com | web-application | ||
Low Medium High Critical | |||
auth.ys7.com | web-application | ||
Low Medium High Critical | |||
api.ys7.com | web-application | ||
Low Medium High Critical | |||
api.ezvizlife.com | web-application | ||
Low Medium High Critical | |||
usauth.ezvizlife.com | web-application | ||
Low Medium High Critical | |||
ius.ezvizlife.com | web-application | ||
Low Medium High Critical | |||
*.ys7.com | web-application | ||
Low Medium High Critical | |||
.eziot.com | web-application | ||
Low Medium High Critical |
Out of scopes
- scc-chat.ys7.com
- Test environment (for example: test.ys7.com)
- Pre-release environment (for example: pb.ys7.com)
Vulnerability types
Qualifying vulnerabilities
- Unauthorized access to user cameras for live streaming/playback
- Full database access or SQL injection exposing sensitive core database data
- Command injection, remote command execution, web shell upload, or Remote Code Execution (RCE) (including kernel-level exploits like buffer overflows)
- Large-scale data exposure (≥100,000 records or three sensitive fields) or sensitive data leaks (≥10,000 records)
- Severe business logic flaws (e.g., account login, password reset, unauthorized financial transactions)
- System permission vulnerabilities (e.g., command injection, RCE, SQLi)
- SSRF enabling internal network access
- Privilege escalation (e.g., authentication bypass, administrative backend access)
- Theft of identity information via XSS or SQLi on critical pages
- Unauthorized access to modify user data or perform operations
- Ordinary data leaks (e.g., source code, cloud key exposure, or logs)
- Exploitable communication protocols or business logic flaws
- Reflected XSS, JSON hijacking, or CSRF in sensitive operations
- Minor logic flaws (e.g., bypassing SMS/email verification)
- Minor data leaks (e.g., source code, sensitive logs, or phpinfo leaks)
- Self-XSS or file parsing vulnerabilities with noticeable impact
- Unauthorized access on non-critical functional interfaces
Non-qualifying vulnerabilities
- Non-security-related bugs (e.g., webpage garbling, functional defects, styling issues)
- Non-exploitable "vulnerabilities" (e.g., scanner reports with no practical significance, self-XSS, HTML Injection, JSON hijacking without sensitive data, CSRF without sensitive operations, meaningless source code leaks, internal IP/domain leaks, logcat leaks without sensitive data)
- Low-risk or hard-to-exploit vulnerabilities (e.g., PDF XSS, URL redirection, email bombing, SSRF without internal network access, username enumeration, concurrent requests affecting insignificant data, meaningless API key leaks, command execution with only dnslog feedback)
- Other issues not directly demonstrating a vulnerability, including user speculation
- Non-reproducible vulnerabilities confirmed as irreproducible by our team
- Non-business-related vulnerabilities not affecting core products or caused by non-core product issues
- Vulnerabilities in test, pre-release, or private cloud demo environments unless proven to affect production environments
- Local denial-of-service vulnerabilities in mobile clients caused by component permissions party secrets)
Hunting requirements
Account access
Ezviz devices
There are no credentials to be provided as this is a blackbox test.
Hunters collaboration
When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.
For more information, see help center.
Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.