Show filters
42 Total Results
Displaying 11-20 of 42
Sort by:
Attacker Value
Unknown

CVE-2017-2884

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the user photo update functionality of Circle with Disney running firmware 2.0.1. A repeated set of specially crafted API calls can cause the device to corrupt essential memory, resulting in a bricked device. An attacker needs network connectivity to the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2914

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable authentication bypass vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A specially crafted token can bypass the authentication routine of the Apid binary, causing the device to grant unintended administrative access. An attacker needs network connectivity to the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2911

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the remote control functionality of Circle with Disney running firmware 2.0.1. SSL certificates for specific domain names can cause the rclient daemon to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2889

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable Denial of Service vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A large amount of simultaneous TCP connections causes the APID daemon to repeatedly fork, causing the daemon to run out of memory and trigger a device reboot. An attacker needs network connectivity to the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2881

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the torlist update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-12085

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable routing vulnerability exists in the Circle with Disney cloud infrastructure. A specially crafted packet can make the Circle cloud route a packet to any arbitrary Circle device. An attacker needs network connectivity to the Internet to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2017-2866

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the /api/CONFIG/backup functionality of Circle with Disney. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2883

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the database update functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause the device to execute arbitrary code. An attacker needs to impersonate a remote server in order to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2915

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the WiFi configuration functionality of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary shell commands. An attacker needs to send a couple of HTTP requests and setup an access point reachable by the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2865

Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the firmware update functionality of Circle with Disney. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability.