First published: Tue Nov 07 2017(Updated: )
An exploitable vulnerability exists in the WiFi configuration functionality of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary shell commands. An attacker needs to send a couple of HTTP requests and setup an access point reachable by the device to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Meetcircle Circle With Disney Firmware | =2.0.1 | |
Meetcircle Circle With Disney |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2915 has a high severity rating due to the potential for remote code execution through arbitrary shell commands.
To fix CVE-2017-2915, upgrade the Circle with Disney device firmware to the latest version provided by Meetcircle.
CVE-2017-2915 affects devices running Circle with Disney firmware version 2.0.1.
An attacker can execute arbitrary shell commands on the affected device by sending crafted HTTP requests and setting up a malicious access point.
Currently, the best mitigation for CVE-2017-2915 is to apply the firmware update as no specific workaround is recommended.