CVE-2017-2842

In the web management interface in Foscam C1 Indoor HD Camera running application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary data in the "msmtprc" configuration file resulting in command execution. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0344 Technical Description Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/99184 Broken Link
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*
cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*

Information

Published : 2017-06-27 08:29

Updated : 2022-06-07 10:28


NVD link : CVE-2017-2842

Mitre link : CVE-2017-2842


JSON object : View

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Advertisement

dedicated server usa

Products Affected

foscam

  • c1_indoor_hd_camera
  • c1_indoor_hd_camera_firmware