First published: Tue Apr 24 2018(Updated: )
An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters resulting in command injection during the boot process. To trigger this vulnerability, an attacker needs to send an HTTP request and reboot the device.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foscam C1 Firmware | =2.52.2.37 | |
Foscam C1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2833 is a command injection vulnerability in the web management interface used by the Foscam C1 Indoor HD Camera.
CVE-2017-2833 affects Foscam C1 Firmware version 2.52.2.37, allowing for command injection through a specially crafted HTTP request.
CVE-2017-2833 has a severity rating of 7.5 (high).
To fix CVE-2017-2833, it is recommended to update the Foscam C1 Firmware to a version that has addressed the vulnerability.
More information about CVE-2017-2833 can be found at the following references: [securityfocus](http://www.securityfocus.com/bid/99184) and [talosintelligence](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0334).