Vulnerability Description
An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters resulting in command injection during the boot process. To trigger this vulnerability, an attacker needs to send an HTTP request and reboot the device.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Foscam | C1 Firmware | 2.52.2.37 |
| Foscam | C1 | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/99184Broken Link
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0334ExploitThird Party Advisory
- http://www.securityfocus.com/bid/99184Broken Link
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0334ExploitThird Party Advisory
FAQ
What is CVE-2017-2833?
CVE-2017-2833 is a vulnerability with a CVSS score of 7.5 (HIGH). An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request ca...
How severe is CVE-2017-2833?
CVE-2017-2833 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2833?
Check the references section above for vendor advisories and patch information. Affected products include: Foscam C1 Firmware, Foscam C1.