First published: Wed Jun 21 2017(Updated: )
An exploitable directory traversal vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause the application to read a file from disk but a failure to adequately filter characters results in allowing an attacker to specify a file outside of a directory. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foscam C1 Indoor Hd Camera Firmware | =2.52.2.37 | |
Foscam C1 Indoor HD camera |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.