First published: Wed Nov 07 2018(Updated: )
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote attackers to execute arbitrary OS commands via the IPv4Address field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opticam I5 Application Firmware | =2.21.1.128 | |
Opticam I5 System Firmware | =1.5.2.11 | |
Opticam i5 | ||
Foscam C2 System Firmware | =2.72.1.32 | |
Foscam C2 Firmware | =1.11.1.8 | |
Foscam C2 System Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19081 has a high severity rating due to the potential for arbitrary OS command execution.
To mitigate CVE-2018-19081, update the Foscam Opticam i5 devices to the latest firmware that addresses this vulnerability.
CVE-2018-19081 specifically affects Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128.
Yes, CVE-2018-19081 can be exploited remotely by attackers due to the vulnerability in the ONVIF devicemgmt SetDNS method.
CVE-2018-19081 enables remote attackers to execute arbitrary OS commands on the affected devices.