First published: Wed May 14 2014(Updated: )
Foscam IP camera 11.37.2.49 and other versions, when using the Foscam DynDNS option, generates credentials based on predictable camera subdomain names, which allows remote attackers to spoof or hijack arbitrary cameras and conduct other attacks by modifying arbitrary camera records in the Foscam DNS server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foscam Ip Camera Firmware | =11.37.2.49 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.