First published: Tue Nov 07 2017(Updated: )
An exploitable vulnerability exists in the torlist update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Meetcircle Circle With Disney Firmware | =2.0.1 | |
Meetcircle Circle With Disney |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2881 is considered a high severity vulnerability due to its potential to execute arbitrary shell scripts.
To fix CVE-2017-2881, you should update the firmware of Circle with Disney to the latest version available.
CVE-2017-2881 can be exploited by intercepting and altering network traffic to send specially crafted packets.
CVE-2017-2881 specifically affects the Circle with Disney firmware version 2.0.1.
Currently, the recommended solution for CVE-2017-2881 is to update the firmware, as no workarounds are officially documented.