First published: Wed Jun 21 2017(Updated: )
An exploitable stack-based buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera. A specially crafted http request can cause a stack-based buffer overflow resulting in overwriting arbitrary data on the stack frame. An attacker can simply send an http request to the device to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netatmo Smart Indoor Camera | <=1.9.3.17 | |
Foscam C1 Indoor HD Camera |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2805 is classified as a high severity vulnerability due to its potential to cause remote code execution.
To fix CVE-2017-2805, you should update the firmware of the Foscam C1 Indoor HD Camera to the latest version beyond 1.9.3.17.
CVE-2017-2805 affects users of the Foscam C1 Indoor HD Camera running firmware version 1.9.3.17 or earlier.
CVE-2017-2805 is a stack-based buffer overflow vulnerability that can be exploited by sending specially crafted HTTP requests.
Yes, exploiting CVE-2017-2805 can lead to overwriting arbitrary data on the stack frame, which may result in data loss.