First published: Mon Mar 13 2017(Updated: )
A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead Web Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5675 is considered a high-severity vulnerability due to its potential for command injection.
To fix CVE-2017-5675, it is recommended to update the affected GoAhead web server software to the latest version.
The potential impacts of CVE-2017-5675 include unauthorized command execution that could compromise the security of IP cameras.
CVE-2017-5675 affects certain models of Foscam, Vstarcam, and other white-label IP cameras using the GoAhead web server.
Yes, CVE-2017-5675 is relatively easy to exploit, making it critical for users to take immediate action to secure their devices.