Show filters
66 Total Results
Displaying 1-10 of 66
Sort by:
Attacker Value
Unknown
CVE-2022-28743
Disclosure Date: April 21, 2022 (last updated February 23, 2025)
Time-of-check Time-of-use (TOCTOU) Race Condition vulerability in Foscam R2C IP camera running System FW <= 1.13.1.6, and Application FW <= 2.91.2.66, allows an authenticated remote attacker with administrator permissions to execute arbitrary remote code via a malicious firmware patch. The impact of this vulnerability is that the remote attacker could gain full remote access to the IP camera and the underlying Linux system with root permissions. With root access to the camera's Linux OS, an attacker could effectively change the code that is running, add backdoor access, or invade the privacy of the user by accessing the live camera stream.
0
Attacker Value
Unknown
CVE-2021-43517
Disclosure Date: April 08, 2022 (last updated October 07, 2023)
FOSCAM Camera FI9805E with firmware V4.02.R12.00018510.10012.143900.00000 contains a backdoor that opens Telnet port when special command is sent on port 9530.
0
Attacker Value
Unknown
CVE-2020-28096
Disclosure Date: December 28, 2020 (last updated November 28, 2024)
FOSCAM FHD X1 1.14.2.4 devices allow attackers (with physical UART access) to login via the ipc.fos~ password.
0
Attacker Value
Unknown
CVE-2013-2574
Disclosure Date: January 29, 2020 (last updated February 21, 2025)
An Access vulnerability exists in FOSCAM IP Camera FI8620 due to insufficient access restrictions in the /tmpfs/ and /log/ directories, which could let a malicious user obtain sensitive information.
0
Attacker Value
Unknown
CVE-2018-19078
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The response to an ONVIF media GetStreamUri request contains the administrator username and password.
0
Attacker Value
Unknown
CVE-2018-19063
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The admin account has a blank password.
0
Attacker Value
Unknown
CVE-2018-19071
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. /mnt/mtd/boot.sh has 0777 permissions, allowing local users to control the commands executed at system start-up.
0
Attacker Value
Unknown
CVE-2018-19072
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. /mnt/mtd/app has 0777 permissions, allowing local users to replace an archive file (within that directory) to control what is extracted to RAM at boot time.
0
Attacker Value
Unknown
CVE-2018-19073
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. They allow attackers to execute arbitrary OS commands via shell metacharacters in the modelName, by leveraging /mnt/mtd/app/config/ProductConfig.xml write access.
0
Attacker Value
Unknown
CVE-2018-19076
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The FTP and RTSP services make it easier for attackers to conduct brute-force authentication attacks, because failed-authentication limits apply only to HTTP (not FTP or RTSP).
0