Show filters
66 Total Results
Displaying 1-10 of 66
Sort by:
Attacker Value
Unknown

CVE-2022-28743

Disclosure Date: April 21, 2022 (last updated February 23, 2025)
Time-of-check Time-of-use (TOCTOU) Race Condition vulerability in Foscam R2C IP camera running System FW <= 1.13.1.6, and Application FW <= 2.91.2.66, allows an authenticated remote attacker with administrator permissions to execute arbitrary remote code via a malicious firmware patch. The impact of this vulnerability is that the remote attacker could gain full remote access to the IP camera and the underlying Linux system with root permissions. With root access to the camera's Linux OS, an attacker could effectively change the code that is running, add backdoor access, or invade the privacy of the user by accessing the live camera stream.
Attacker Value
Unknown

CVE-2021-43517

Disclosure Date: April 08, 2022 (last updated October 07, 2023)
FOSCAM Camera FI9805E with firmware V4.02.R12.00018510.10012.143900.00000 contains a backdoor that opens Telnet port when special command is sent on port 9530.
Attacker Value
Unknown

CVE-2020-28096

Disclosure Date: December 28, 2020 (last updated November 28, 2024)
FOSCAM FHD X1 1.14.2.4 devices allow attackers (with physical UART access) to login via the ipc.fos~ password.
Attacker Value
Unknown

CVE-2013-2574

Disclosure Date: January 29, 2020 (last updated February 21, 2025)
An Access vulnerability exists in FOSCAM IP Camera FI8620 due to insufficient access restrictions in the /tmpfs/ and /log/ directories, which could let a malicious user obtain sensitive information.
Attacker Value
Unknown

CVE-2018-19078

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The response to an ONVIF media GetStreamUri request contains the administrator username and password.
0
Attacker Value
Unknown

CVE-2018-19063

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The admin account has a blank password.
0
Attacker Value
Unknown

CVE-2018-19071

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. /mnt/mtd/boot.sh has 0777 permissions, allowing local users to control the commands executed at system start-up.
0
Attacker Value
Unknown

CVE-2018-19072

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. /mnt/mtd/app has 0777 permissions, allowing local users to replace an archive file (within that directory) to control what is extracted to RAM at boot time.
0
Attacker Value
Unknown

CVE-2018-19073

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. They allow attackers to execute arbitrary OS commands via shell metacharacters in the modelName, by leveraging /mnt/mtd/app/config/ProductConfig.xml write access.
0
Attacker Value
Unknown

CVE-2018-19076

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The FTP and RTSP services make it easier for attackers to conduct brute-force authentication attacks, because failed-authentication limits apply only to HTTP (not FTP or RTSP).
0