First published: Thu Jun 29 2017(Updated: )
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during manual network configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netatmo Smart Indoor Camera | =2.52.2.37 | |
Foscam C1 Indoor HD Camera Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-2847 is considered high due to the potential for command injection vulnerabilities.
To fix CVE-2017-2847, update the Foscam C1 Indoor HD camera firmware to the latest version available.
The potential impact of CVE-2017-2847 includes unauthorized access and execution of commands on the affected camera.
CVE-2017-2847 affects Foscam C1 Indoor HD cameras running application firmware version 2.52.2.37.
An attacker can exploit CVE-2017-2847 by sending a specially crafted HTTP request during the manual network configuration process.