An exploitable vulnerability exists in the signature verification of the firmware update functionality of Circle with Disney. Specially crafted network packets can cause an unsigned firmware to be installed in the device resulting in arbitrary code execution. An attacker can send a series of packets to trigger this vulnerability.
References
Link | Resource |
---|---|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 | Exploit Technical Description Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2017-11-07 16:29
Updated : 2024-11-21 03:24
NVD link : CVE-2017-2898
Mitre link : CVE-2017-2898
CVE.ORG link : CVE-2017-2898
JSON object : View
Products Affected
meetcircle
- circle_with_disney_firmware
- circle_with_disney
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')