An issue was discovered on Wireless IP Camera (P2P) WIFICAM cameras. There is Command Injection in the set_ftp.cgi script via shell metacharacters in the pwd variable, as demonstrated by a set_ftp.cgi?svr=192.168.1.1&port=21&user=ftp URI.
References
Link | Resource |
---|---|
https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-root-rce | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-06-11T20:44:37
Updated: 2019-06-11T20:44:37
Reserved: 2019-06-11T00:00:00
Link: CVE-2017-18377
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-06-11T21:29:00.473
Modified: 2021-06-22T15:55:23.527
Link: CVE-2017-18377
JSON object: View
Redhat Information
No data.
CWE