Show filters
66 Total Results
Displaying 21-30 of 66
Sort by:
Attacker Value
Unknown

CVE-2018-19081

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote attackers to execute arbitrary OS commands via the IPv4Address field.
0
Attacker Value
Unknown

CVE-2018-19077

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. RtspServer allows remote attackers to cause a denial of service (daemon hang or restart) via a negative integer in the RTSP Content-Length header.
0
Attacker Value
Unknown

CVE-2018-19082

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote attackers to conduct stack-based buffer overflow attacks via the IPv4Address field.
0
Attacker Value
Unknown

CVE-2018-19075

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The firewall feature makes it easier for remote attackers to ascertain credentials and firewall rules because invalid credentials lead to error -2, whereas rule-based blocking leads to error -8.
0
Attacker Value
Unknown

CVE-2017-2873

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during the SoftAP configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2877

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
A missing error check exists in the Multi-Camera interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted request on port 10001 could allow an attacker to reset the user accounts to factory defaults, without authentication.
Attacker Value
Unknown

CVE-2017-2876

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable buffer overflow vulnerability exists in the Multi-Camera interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted request on port 10000 can cause a buffer overflow resulting in overwriting arbitrary data.
Attacker Value
Unknown

CVE-2017-2875

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable buffer overflow vulnerability exists in the Multi-Camera interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted request on port 10000 can cause a buffer overflow resulting in overwriting arbitrary data.
Attacker Value
Unknown

CVE-2017-2879

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable buffer overflow vulnerability exists in the UPnP implementation used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted UPnP discovery response can cause a buffer overflow resulting in overwriting arbitrary data. An attacker needs to be in the same subnetwork and reply to a discovery message to trigger this vulnerability.
Attacker Value
Unknown

CVE-2017-2855

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.