Vulnerability Name: | CVE-2017-2833 (CCN-127436) | ||||||||||||
Assigned: | 2016-12-01 | ||||||||||||
Published: | 2017-06-19 | ||||||||||||
Updated: | 2022-06-07 | ||||||||||||
Summary: | An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters resulting in command injection during the boot process. To trigger this vulnerability, an attacker needs to send an HTTP request and reboot the device. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-77 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-2833 Source: CCN Type: Foscam Web site Indoor IP Camera C1 Series Source: BID Type: Broken Link 99184 Source: CCN Type: BID-99184 Foscam IP Video Camera Multiple Command Injection Vulnerabilities Source: XF Type: UNKNOWN foscam-cve20172833-cmd-exec(127436) Source: CCN Type: Talos Vulnerability Report TALOS-2017-0334 Foscam IP Video Camera CGIProxy.fcgi FTP Startup Configuration Command Injection Vulnerability Source: MISC Type: Exploit, Third Party Advisory https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0334 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |