CVE-2017-8225

On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wificam:wireless_ip_camera_\(p2p\)_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:wificam:wireless_ip_camera_\(p2p\):-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:33

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2017/Mar/23 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2017/Mar/23 - Exploit, Mailing List, Third Party Advisory
References () https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead - Exploit, Third Party Advisory () https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead - Exploit, Third Party Advisory

Information

Published : 2017-04-25 20:59

Updated : 2024-11-21 03:33


NVD link : CVE-2017-8225

Mitre link : CVE-2017-8225

CVE.ORG link : CVE-2017-8225


JSON object : View

Products Affected

wificam

  • wireless_ip_camera_\(p2p\)
  • wireless_ip_camera_\(p2p\)_firmware
CWE
CWE-522

Insufficiently Protected Credentials