CVE-2017-18377

An issue was discovered on Wireless IP Camera (P2P) WIFICAM cameras. There is Command Injection in the set_ftp.cgi script via shell metacharacters in the pwd variable, as demonstrated by a set_ftp.cgi?svr=192.168.1.1&port=21&user=ftp URI.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:goahead:wireless_ip_camera_wificam_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:goahead:wireless_ip_camera_wificam:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:19

Type Values Removed Values Added
References () https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-root-rceĀ - Exploit, Third Party Advisory () https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-root-rceĀ - Exploit, Third Party Advisory

Information

Published : 2019-06-11 21:29

Updated : 2024-11-21 03:19


NVD link : CVE-2017-18377

Mitre link : CVE-2017-18377

CVE.ORG link : CVE-2017-18377


JSON object : View

Products Affected

goahead

  • wireless_ip_camera_wificam
  • wireless_ip_camera_wificam_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')