First published: Thu Jun 29 2017(Updated: )
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during NTP server configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netatmo Smart Indoor Camera | =2.52.2.37 | |
Foscam C1 Indoor HD Camera Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2849 is classified as a high severity vulnerability due to the potential for command injection.
To mitigate CVE-2017-2849, update the firmware of the Foscam C1 Indoor HD camera to a version that addresses this vulnerability.
CVE-2017-2849 specifically affects Foscam C1 Indoor HD cameras running firmware version 2.52.2.37.
CVE-2017-2849 enables an attacker to perform command injection through specially crafted HTTP requests.
Yes, CVE-2017-2849 can be exploited remotely if the attacker can send HTTP requests to the vulnerable camera.