On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Mar/23 | Exploit Mailing List Third Party Advisory |
https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2017/Mar/23 | Exploit Mailing List Third Party Advisory |
https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Mar/23 - Exploit, Mailing List, Third Party Advisory | |
References | () https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead - Exploit, Third Party Advisory |
Information
Published : 2017-04-25 20:59
Updated : 2024-11-21 03:33
NVD link : CVE-2017-8225
Mitre link : CVE-2017-8225
CVE.ORG link : CVE-2017-8225
JSON object : View
Products Affected
wificam
- wireless_ip_camera_\(p2p\)
- wireless_ip_camera_\(p2p\)_firmware
CWE
CWE-522
Insufficiently Protected Credentials