Vulnerability Description
An issue was discovered on Wireless IP Camera (P2P) WIFICAM cameras. There is Command Injection in the set_ftp.cgi script via shell metacharacters in the pwd variable, as demonstrated by a set_ftp.cgi?svr=192.168.1.1&port=21&user=ftp URI.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Goahead | Wireless Ip Camera Wificam Firmware | - |
| Goahead | Wireless Ip Camera Wificam | - |
Related Weaknesses (CWE)
References
- https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-roExploitThird Party Advisory
- https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-roExploitThird Party Advisory
FAQ
What is CVE-2017-18377?
CVE-2017-18377 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered on Wireless IP Camera (P2P) WIFICAM cameras. There is Command Injection in the set_ftp.cgi script via shell metacharacters in the pwd variable, as demonstrated by a set_ftp.cgi...
How severe is CVE-2017-18377?
CVE-2017-18377 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-18377?
Check the references section above for vendor advisories and patch information. Affected products include: Goahead Wireless Ip Camera Wificam Firmware, Goahead Wireless Ip Camera Wificam.