CVE-2020-7879

This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:iptime:c200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:iptime:c200:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 9.8
v2 : 6.8
v3 : 8.8
References () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36365 - Third Party Advisory () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36365 - Third Party Advisory

Information

Published : 2021-11-30 19:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7879

Mitre link : CVE-2020-7879

CVE.ORG link : CVE-2020-7879


JSON object : View

Products Affected

iptime

  • c200
  • c200_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')