First published: Tue Nov 07 2017(Updated: )
An exploitable vulnerability exists in the firmware update functionality of Circle with Disney. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Meetcircle Circle With Disney Firmware | =2.0.1 | |
Meetcircle Circle With Disney |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2865 has been classified as a high severity vulnerability due to the potential for remote code execution.
To mitigate CVE-2017-2865, it is recommended to update the Circle with Disney firmware to a version that addresses the vulnerability.
CVE-2017-2865 specifically affects Circle with Disney firmware version 2.0.1.
An attacker can exploit CVE-2017-2865 to execute arbitrary shell commands on the affected device through specially crafted network packets.
The hardware itself is not considered vulnerable, but the firmware version 2.0.1 has a significant vulnerability that can be exploited.