CVE-2017-2872
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Insufficient security checks exist in the recovery procedure used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A HTTP request can allow for a user to perform a firmware upgrade using a crafted image. Before any firmware upgrades in this image are flashed to the device, binaries as well as arguments to shell commands contained in the image are executed with elevated privileges.
Existen comprobaciones de seguridad insuficientes en el procedimiento de recuperación empleado por Foscam C1 Indoor HD Camera ejecutando el firmware de aplicación 2.52.2.43. Una petición HTTP puede permitir que un usuario realice una actualización de firmware mediante una imagen manipulada. Antes de que se "flasheen" actualizaciones de firmware en esta imagen en el dispositivo, los binarios y los argumentos a los comandos shell contenidos en la imagen se ejecutan con privilegios elevados.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-12-01 CVE Reserved
- 2018-09-17 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-287: Improper Authentication
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0379 | 2024-09-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Foscam Search vendor "Foscam" | C1 Firmware Search vendor "Foscam" for product "C1 Firmware" | 2.52.2.43 Search vendor "Foscam" for product "C1 Firmware" and version "2.52.2.43" | - |
Affected
| in | Foscam Search vendor "Foscam" | C1 Search vendor "Foscam" for product "C1" | - | - |
Safe
|