Show filters
42 Total Results
Displaying 11-20 of 42
Sort by:
Attacker Value
Unknown
CVE-2017-2884
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the user photo update functionality of Circle with Disney running firmware 2.0.1. A repeated set of specially crafted API calls can cause the device to corrupt essential memory, resulting in a bricked device. An attacker needs network connectivity to the device to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2914
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable authentication bypass vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A specially crafted token can bypass the authentication routine of the Apid binary, causing the device to grant unintended administrative access. An attacker needs network connectivity to the device to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2911
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the rclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2889
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable Denial of Service vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A large amount of simultaneous TCP connections causes the APID daemon to repeatedly fork, causing the daemon to run out of memory and trigger a device reboot. An attacker needs network connectivity to the device to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2881
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the torlist update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-12085
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable routing vulnerability exists in the Circle with Disney cloud infrastructure. A specially crafted packet can make the Circle cloud route a packet to any arbitrary Circle device. An attacker needs network connectivity to the Internet to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2866
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the /api/CONFIG/backup functionality of Circle with Disney. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2883
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the database update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the device to execute arbitrary code. An attacker needs to impersonate a remote server in order to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2915
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the WiFi configuration functionality of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary shell commands. An attacker needs to send a couple of HTTP requests and setup an access point reachable by the device to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2865
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the firmware update functionality of Circle with Disney. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability.
0