First published: Wed Jun 21 2017(Updated: )
An exploitable directory traversal vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause the application to read a file from disk but a failure to adequately filter characters results in allowing an attacker to specify a file outside of a directory. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foscam IP Camera Firmware | =2.52.2.37 | |
Foscam C1 HD Indoor Camera |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2829 is considered a moderate severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2017-2829, update the Foscam C1 Indoor HD Camera firmware to a version that addresses this vulnerability.
The impact of CVE-2017-2829 is that an attacker can exploit the vulnerability to read sensitive files from the device's filesystem.
CVE-2017-2829 affects the Foscam C1 Indoor HD Camera running firmware version 2.52.2.37.
Yes, there are known exploits for CVE-2017-2829 that utilize specially crafted HTTP requests to trigger the directory traversal.