First published: Wed Nov 07 2018(Updated: )
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The CGIProxy.fcgi?cmd=setTelnetSwitch feature is authorized for the root user with a password of toor.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opticam I5 Application Firmware | =2.21.1.128 | |
Opticam I5 System Firmware | =1.5.2.11 | |
Opticam i5 | ||
Foscam C2 System Firmware | =2.72.1.32 | |
Foscam C2 Firmware | =1.11.1.8 | |
Foscam C2 System Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19069 is considered to have a high severity due to unauthorized access to critical system features on affected devices.
To remediate CVE-2018-19069, you should update the firmware of your Foscam C2 or Opticam i5 devices to the latest versions provided by the manufacturer.
CVE-2018-19069 affects Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, as well as Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128.
CVE-2018-19069 allows unauthorized users to enable Telnet access on affected devices through a specific CGI proxy command.
As of the latest reports, there is potential for exploitation of CVE-2018-19069, making it critical for users to apply necessary updates and security patches.