Vulnerability Description
An exploitable directory traversal vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause the application to read a file from disk but a failure to adequately filter characters results in allowing an attacker to specify a file outside of a directory. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Foscam | C1 Indoor Hd Camera Firmware | 2.52.2.37 |
| Foscam | C1 Indoor Hd Camera | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/99250Broken Link
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0330ExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/99250Broken Link
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0330ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-2829?
CVE-2017-2829 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An exploitable directory traversal vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request ...
How severe is CVE-2017-2829?
CVE-2017-2829 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2829?
Check the references section above for vendor advisories and patch information. Affected products include: Foscam C1 Indoor Hd Camera Firmware, Foscam C1 Indoor Hd Camera.