CVE-2017-2829

An exploitable directory traversal vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause the application to read a file from disk but a failure to adequately filter characters results in allowing an attacker to specify a file outside of a directory. An attacker can simply send an HTTP request to the device to trigger this vulnerability.

MISC: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0330
BID: http://www.securityfocus.com/bid/99250
CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2829

7 years
222 countries
114k users
820k calculations
Logo www.eleksys.cz
Logo reolink.com
Logo blog.camcloud.com
Logo www.kelcom.cz
Logo www.i4wifi.cz
Logo secutek.cz