CVE-2017-2872

Insufficient security checks exist in the recovery procedure used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A HTTP request can allow for a user to perform a firmware upgrade using a crafted image. Before any firmware upgrades in this image are flashed to the device, binaries as well as arguments to shell commands contained in the image are executed with elevated privileges.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:foscam:c1_firmware:2.52.2.43:*:*:*:*:*:*:*
cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:24

Type Values Removed Values Added
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0379 - Exploit, Third Party Advisory () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0379 - Exploit, Third Party Advisory

Information

Published : 2018-09-17 20:29

Updated : 2024-11-21 03:24


NVD link : CVE-2017-2872

Mitre link : CVE-2017-2872

CVE.ORG link : CVE-2017-2872


JSON object : View

Products Affected

foscam

  • c1_firmware
  • c1
CWE
CWE-287

Improper Authentication