An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during the SoftAP configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-12014 | An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during the SoftAP configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-09-16T20:07:36.326Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2873
No data.
Status : Modified
Published: 2018-09-19T18:29:00.343
Modified: 2024-11-21T03:24:22.073
Link: CVE-2017-2873
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD