Rostelecom CS-C2SHW 5.0.082.1 is affected by: Bash command injection. The camera reads configuration from QR code (including network settings). The static IP configuration from QR code is copied to the file /config/ip-static and after reboot data from this file is inserted into bash command (without any escaping). So bash injection is possible. Camera doesn't parse QR codes if it's already successfully configured. Camera is always rebooted after successful configuration via QR code.
References
Link | Resource |
---|---|
https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 | Exploit Third Party Advisory |
https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://dil4rd.medium.com/groundhog-day-in-iot-valley-or-5-cves-in-1-camera-7dc1d2864707 - Exploit, Third Party Advisory |
Information
Published : 2021-01-26 18:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27542
Mitre link : CVE-2020-27542
CVE.ORG link : CVE-2020-27542
JSON object : View
Products Affected
company
- cs-c2shw_firmware
- cs-c2shw
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')