First published: Thu Nov 01 2018(Updated: )
An exploitable code execution vulnerability exists in the cloud OTA setup functionality of Yi Home Camera 27US 1.8.7.0D. A specially crafted SSID can cause a command injection, resulting in code execution. An attacker can cause a camera to connect to this SSID to trigger this vulnerability. Alternatively, an attacker can convince a user to connect their camera to this SSID.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Yitechnology Yi Home Camera Firmware | =1.8.7.0d | |
Yitechnology Yi Home Camera Firmware | ||
Yitechnology Yi Home |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3910 has been classified as a critical severity vulnerability due to its potential for remote code execution.
CVE-2018-3910 exploits a command injection vulnerability triggered by a specially crafted SSID that the Yi Home Camera connects to.
CVE-2018-3910 affects users of Yi Home Camera running firmware version 1.8.7.0D.
To mitigate CVE-2018-3910, users should update their Yi Home Camera firmware to the latest version provided by the manufacturer.
If updating is not possible, disconnect the Yi Home Camera from any Wi-Fi networks to avoid potential exploitation of CVE-2018-3910.