First published: Thu Jun 29 2017(Updated: )
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during manual network configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netatmo Smart Indoor Camera | =2.52.2.37 | |
Foscam C1 Indoor HD Camera Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2848 has a medium severity rating, indicating a moderate risk of exploitation.
To mitigate CVE-2017-2848, update the Foscam C1 Indoor HD camera firmware to the latest version provided by the manufacturer.
CVE-2017-2848 is a command injection vulnerability affecting the web management interface of specific Foscam camera firmware.
CVE-2017-2848 affects Foscam C1 Indoor HD cameras running firmware version 2.52.2.37.
Yes, CVE-2017-2848 can be exploited remotely through specially crafted HTTP requests.