An exploitable vulnerability exists in the WiFi Channel parsing of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary sed commands. An attacker needs to setup an access point reachable by the device to trigger this vulnerability.
References
Link | Resource |
---|---|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0446 | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-11-07 08:29
Updated : 2022-04-19 12:15
NVD link : CVE-2017-12094
Mitre link : CVE-2017-12094
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
meetcircle
- circle_with_disney_firmware
- circle_with_disney