First published: Tue Jun 11 2019(Updated: )
An issue was discovered on Wireless IP Camera (P2P) WIFICAM cameras. There is Command Injection in the set_ftp.cgi script via shell metacharacters in the pwd variable, as demonstrated by a set_ftp.cgi?svr=192.168.1.1&port=21&user=ftp URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Goahead Wireless Ip Camera Wificam Firmware | ||
Goahead Wireless Ip Camera Wificam |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.