CVE-2017-2898

An exploitable vulnerability exists in the signature verification of the firmware update functionality of Circle with Disney. Specially crafted network packets can cause an unsigned firmware to be installed in the device resulting in arbitrary code execution. An attacker can send a series of packets to trigger this vulnerability.
References
Link Resource
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 Exploit Technical Description Third Party Advisory
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:meetcircle:circle_with_disney_firmware:2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:meetcircle:circle_with_disney:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:24

Type Values Removed Values Added
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 - Exploit, Technical Description, Third Party Advisory () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0405 - Exploit, Technical Description, Third Party Advisory

Information

Published : 2017-11-07 16:29

Updated : 2024-11-21 03:24


NVD link : CVE-2017-2898

Mitre link : CVE-2017-2898

CVE.ORG link : CVE-2017-2898


JSON object : View

Products Affected

meetcircle

  • circle_with_disney_firmware
  • circle_with_disney
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')