First published: Tue Jul 24 2018(Updated: )
The DBPOWER U818A WIFI quadcopter drone provides FTP access over its own local access point, and allows full file permissions to the anonymous user. The DBPower U818A WIFI quadcopter drone runs an FTP server that by default allows anonymous access without a password, and provides full filesystem read/write permissions to the anonymous user. A remote user within range of the open access point on the drone may utilize the anonymous user of the FTP server to read arbitrary files, such as images and video recorded by the device, or to replace system files such as /etc/shadow to gain further access to the device. Furthermore, the DBPOWER U818A WIFI quadcopter drone uses BusyBox 1.20.2, which was released in 2012, and may be vulnerable to other known BusyBox vulnerabilities.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dbpower U818a Firmware | ||
Busybox Busybox | ||
DBPOWER U818A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3209 is a vulnerability in the DBPOWER U818A WIFI quadcopter drone that allows anonymous FTP access over its local access point with full file permissions.
CVE-2017-3209 has a severity rating of 8.1 out of 10 (high severity).
The DBPOWER U818A WIFI quadcopter drone with the Dbpower U818a Firmware is affected by CVE-2017-3209.
To fix CVE-2017-3209, it is recommended to update the firmware of the DBPOWER U818A WIFI quadcopter drone to a version that addresses the vulnerability.
More information about CVE-2017-3209 can be found at the following references: [1], [2], [3].