PatchSiren cyber security CVE debrief
CVE-2016-10204 Zoneminder CVE debrief
CVE-2016-10204 is a critical SQL injection issue in Zoneminder 1.30.0 and earlier. NVD states that a remote attacker can execute arbitrary SQL commands through the limit parameter in a log query request to index.php. The CVE was published on 2017-03-03 and the NVD record was later modified on 2026-05-13.
- Vendor
- Zoneminder
- Product
- CVE-2016-10204
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-03
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-03
- Advisory updated
- 2026-05-13
Who should care
Zoneminder administrators, security teams, and operators of any deployment running version 1.30.0 or earlier, especially systems exposed to untrusted networks.
Technical summary
NVD classifies the weakness as CWE-89 (SQL Injection) and rates it CVSS 3.0 9.8/CRITICAL with AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerable surface is a log query request handled by index.php, where the limit parameter can be abused to inject SQL. The affected version range in the NVD CPE data is Zoneminder up to and including 1.30.0.
Defensive priority
Urgent. This is network-reachable, requires no privileges or user interaction, and is scored as critical with high impact across confidentiality, integrity, and availability.
Recommended defensive actions
- Inventory Zoneminder deployments and confirm whether any instance is running 1.30.0 or earlier.
- Upgrade to a patched or supported Zoneminder release newer than 1.30.0.
- Restrict access to the Zoneminder web interface to trusted networks until remediation is complete.
- Review application and database logs for unexpected SQL activity associated with index.php log query requests.
- If exposure is confirmed, validate database integrity and rotate credentials used by the application as part of incident response.
Evidence notes
The source corpus includes the NVD CVE record, which lists the vulnerability status as Modified, the affected CPE range through 1.30.0, CVSS 3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and CWE-89. References in the corpus include an oss-security mailing list post and a Foxmole advisory; both are tagged as exploit-related references, but this debrief does not rely on them for attack details.
Official resources
-
CVE-2016-10204 CVE record
CVE.org
-
CVE-2016-10204 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
[email protected] - Exploit, Mailing List
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory
CVE published by CVE/NVD on 2017-03-03; NVD record modified on 2026-05-13. Not listed as a CISA KEV item in the supplied enrichment data.