Show filters
66 Total Results
Displaying 21-30 of 66
Sort by:
Attacker Value
Unknown
CVE-2018-19081
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote attackers to execute arbitrary OS commands via the IPv4Address field.
0
Attacker Value
Unknown
CVE-2018-19077
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. RtspServer allows remote attackers to cause a denial of service (daemon hang or restart) via a negative integer in the RTSP Content-Length header.
0
Attacker Value
Unknown
CVE-2018-19082
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote attackers to conduct stack-based buffer overflow attacks via the IPv4Address field.
0
Attacker Value
Unknown
CVE-2018-19075
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The firewall feature makes it easier for remote attackers to ascertain credentials and firewall rules because invalid credentials lead to error -2, whereas rule-based blocking leads to error -8.
0
Attacker Value
Unknown
CVE-2017-2873
Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during the SoftAP configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2877
Disclosure Date: September 19, 2018 (last updated November 27, 2024)
A missing error check exists in the Multi-Camera interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted request on port 10001 could allow an attacker to reset the user accounts to factory defaults, without authentication.
0
Attacker Value
Unknown
CVE-2017-2876
Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable buffer overflow vulnerability exists in the Multi-Camera interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted request on port 10000 can cause a buffer overflow resulting in overwriting arbitrary data.
0
Attacker Value
Unknown
CVE-2017-2875
Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable buffer overflow vulnerability exists in the Multi-Camera interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted request on port 10000 can cause a buffer overflow resulting in overwriting arbitrary data.
0
Attacker Value
Unknown
CVE-2017-2879
Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable buffer overflow vulnerability exists in the UPnP implementation used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted UPnP discovery response can cause a buffer overflow resulting in overwriting arbitrary data. An attacker needs to be in the same subnetwork and reply to a discovery message to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2855
Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.
0