First published: Wed Jun 21 2017(Updated: )
An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during account creation resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netatmo Smart Indoor Camera | =2.52.2.37 | |
Foscam C1 Indoor HD Camera Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2828 is considered a high severity vulnerability due to the potential for arbitrary command injection.
To fix CVE-2017-2828, update the Foscam C1 Indoor HD Camera firmware to a version that addresses this vulnerability.
CVE-2017-2828 is a command injection vulnerability that affects the web management interface of the camera.
Users of the Foscam C1 Indoor HD Camera running firmware version 2.52.2.37 are affected by CVE-2017-2828.
Attackers can exploit CVE-2017-2828 by sending specially crafted HTTP requests that inject arbitrary shell commands.