Vulnerability Description
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Foscam | C1 Firmware | 2.52.2.43 |
| Foscam | C1 | - |
Related Weaknesses (CWE)
References
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0359ExploitThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0359ExploitThird Party Advisory
FAQ
What is CVE-2017-2856?
CVE-2017-2856 is a vulnerability with a CVSS score of 8.1 (HIGH). An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is a...
How severe is CVE-2017-2856?
CVE-2017-2856 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2856?
Check the references section above for vendor advisories and patch information. Affected products include: Foscam C1 Firmware, Foscam C1.