First published: Tue Jun 11 2019(Updated: )
An issue was discovered on Wireless IP Camera (P2P) WIFICAM cameras. There is Command Injection in the set_ftp.cgi script via shell metacharacters in the pwd variable, as demonstrated by a set_ftp.cgi?svr=192.168.1.1&port=21&user=ftp URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Goahead Wireless IP Camera Wificam | ||
Goahead Wireless IP Camera Wificam |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18377 has a medium severity rating due to its ability to allow command injection in affected devices.
To fix CVE-2017-18377, update the firmware of the Wireless IP Camera to the latest version provided by the manufacturer.
CVE-2017-18377 affects Wireless IP Camera (P2P) WIFICAM devices using vulnerable firmware.
Yes, CVE-2017-18377 can lead to unauthorized remote command execution on the affected cameras.
The nature of the vulnerability in CVE-2017-18377 is command injection through improper handling of user input in the set_ftp.cgi script.