On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
References
Link | Resource |
---|---|
https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2017/Mar/23 | Exploit Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-04-25 13:59
Updated : 2019-10-02 17:03
NVD link : CVE-2017-8225
Mitre link : CVE-2017-8225
JSON object : View
CWE
CWE-522
Insufficiently Protected Credentials
Products Affected
wificam
- wireless_ip_camera_\(p2p\)
- wireless_ip_camera_\(p2p\)_firmware