Saying there was glitch in one of your servers is mis-leading.
I understand that you simply re-brand hanbang / Dahua camera's and DVRs, so maybe you don't actually have any knowledge of the undocumented telnet access that is still running in the latest version of your firmware.
And maybe you don't actually know that the camera's and DVRs connect to a T2uSvr @
nat.vveye.net regardless of what the settings are, and register with a dns server that doesn't show in the settings anywhere and cannot be removed.
But the people who's products you rebrand were notified in March of the issue and it was documented in CVE-2017-14335
https://nvd.nist.gov/vuln/detail/CVE-2017-14335You could consider CVE-2017-14335 a "glitch" since it is an exploit of the HTTP server not properly handeling authentication.
But the previous CVE's going back 5 years specifically mention the backdoor telnet access.
You have been "patching" this backdoor since at least 2012, and while thousands of camera's and NVR get hacked over and over, the backdoor is never removed, just the undocumented account and password are changed.
hikvision and Dahua refused to admit it existed, and Hanbang simply refused to respond.
I ran a port scan on your latest firmware and sure enough Telnet on port 23 is responding, although it is not documented anywhere in your product information.
On your camera, after I downloaded the latest firmware it took less than 10 minutes for me to guess the backdoor password you still have in place.
I understand you only resell what the Chinese feel like giving you, that isn't your fault.
Continuing to do it when you know about it is.
I was hoping You could just copy this to GW SECU, and GW Security-inc etal "QA" areas and save on the reposting.
regards
DJ