This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
References
Link | Resource |
---|---|
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36365 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-11-30 11:15
Updated : 2021-12-01 12:13
NVD link : CVE-2020-7879
Mitre link : CVE-2020-7879
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
iptime
- c200
- c200_firmware