Vulnerability Description
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary characters in the pureftpd.passwd file during a username change, which in turn allows for bypassing chroot restrictions in the FTP server. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Foscam | C1 Indoor Hd Camera Firmware | 2.52.2.37 |
| Foscam | C1 Indoor Hd Camera | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/99184Broken Link
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0352Technical DescriptionThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/99184Broken Link
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0352Technical DescriptionThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-2850?
CVE-2017-2850 is a vulnerability with a CVSS score of 8.8 (HIGH). In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary characters in the pureftpd...
How severe is CVE-2017-2850?
CVE-2017-2850 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2850?
Check the references section above for vendor advisories and patch information. Affected products include: Foscam C1 Indoor Hd Camera Firmware, Foscam C1 Indoor Hd Camera.