First published: Wed Nov 07 2018(Updated: )
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. /mnt/mtd/boot.sh has 0777 permissions, allowing local users to control the commands executed at system start-up.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opticam I5 Application Firmware | =2.21.1.128 | |
Opticam I5 System Firmware | =1.5.2.11 | |
Opticam i5 | ||
Foscam C2 Application Firmware | =2.72.1.32 | |
Foscam C2 System Firmware | =1.11.1.8 | |
Foscam C2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-19071.
Version 2.72.1.32 of the Foscam C2 application firmware is affected.
Version 1.11.1.8 of the Foscam C2 system firmware is affected.
Version 2.21.1.128 of the Opticam i5 application firmware is affected.
Version 1.5.2.11 of the Opticam i5 system firmware is affected.
This vulnerability has a severity value of 7.8 (high).
The CWE ID for this vulnerability is CWE-732.
To fix this vulnerability, update your Foscam C2 or Opticam i5 devices to the latest firmware version available.
You can find more information about this vulnerability at the following link: https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt