First published: Wed Nov 07 2018(Updated: )
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote attackers to conduct stack-based buffer overflow attacks via the IPv4Address field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opticam I5 Application Firmware | =2.21.1.128 | |
Opticam I5 System Firmware | =1.5.2.11 | |
Opticam i5 | ||
Foscam C2 Application Firmware | =2.72.1.32 | |
Foscam C2 System Firmware | =1.11.1.8 | |
Foscam C2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-19082.
The severity level of CVE-2018-19082 is critical, with a severity value of 9.8.
Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128 are affected by CVE-2018-19082.
A remote attacker can exploit CVE-2018-19082 by conducting stack-based buffer overflow attacks via the IPv4Address field of the ONVIF devicemgmt SetDNS method.
More information about CVE-2018-19082 can be found at https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt.