This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
References
Link | Resource |
---|---|
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36365 | Third Party Advisory |
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36365 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
References | () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36365 - Third Party Advisory |
Information
Published : 2021-11-30 19:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7879
Mitre link : CVE-2020-7879
CVE.ORG link : CVE-2020-7879
JSON object : View
Products Affected
iptime
- c200
- c200_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')