ID

VAR-201706-0499


CVE

CVE-2017-2844


TITLE

Foscam C1 Indoor HD Camera Web Command injection vulnerability in management interface

Trust: 0.8

sources: JVNDB: JVNDB-2017-005148

DESCRIPTION

In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary data in the "msmtprc" configuration file resulting in command execution. An attacker can simply send an HTTP request to the device to trigger this vulnerability. FoscamC1IndoorHDCamera is a wireless HD IP camera from China Foscam. There is a security vulnerability in FoscamC1IndoorHDCamera with version 2.52.2.37 application firmware. Foscam IP Video Camera is prone to multiple command-injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary commands in context of the affected device. ### Tested Versions ``` Foscam, Inc. Indoor IP Camera C1 Series System Firmware Version: 1.9.3.17 Application Firmware Version: 2.52.2.37 Web Version: 2.0.1.1 Plug-In Version: 3.3.0.5 ``` ### Product URLs Foscam ### CVSSv3 Score 8.8 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ### CWE CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection') ### Details Foscam produces a series of IP-capable surveillance devices, network video recorders, and baby monitors for the end-user. Foscam produces a range of cameras for both indoor and outdoor use..

Trust: 2.52

sources: NVD: CVE-2017-2844 // JVNDB: JVNDB-2017-005148 // CNVD: CNVD-2017-14059 // BID: 99184 // VULHUB: VHN-111047

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-14059

AFFECTED PRODUCTS

vendor:foscammodel:c1 indoor hd camerascope:eqversion:2.52.2.37

Trust: 2.4

vendor:foscammodel:c1 indoor hd camerasscope:lteversion:<=2.52.2.37

Trust: 0.6

vendor:foscammodel:ip video camerascope:eqversion:1.9.3.17

Trust: 0.3

vendor:foscammodel:ip video camerascope:neversion:2.0.2.43

Trust: 0.3

sources: CNVD: CNVD-2017-14059 // BID: 99184 // JVNDB: JVNDB-2017-005148 // CNNVD: CNNVD-201706-1218 // NVD: CVE-2017-2844

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2844
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2844
value: HIGH

Trust: 1.0

NVD: CVE-2017-2844
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-14059
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201706-1218
value: HIGH

Trust: 0.6

VULHUB: VHN-111047
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-2844
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-14059
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-111047
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

talos-cna@cisco.com: CVE-2017-2844
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2017-2844
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2017-14059 // VULHUB: VHN-111047 // JVNDB: JVNDB-2017-005148 // CNNVD: CNNVD-201706-1218 // NVD: CVE-2017-2844 // NVD: CVE-2017-2844

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-111047 // JVNDB: JVNDB-2017-005148 // NVD: CVE-2017-2844

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-1218

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201706-1218

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-005148

PATCH

title:Top Pageurl:https://www.foscam.com/

Trust: 0.8

title:FoscamC1IndoorHDCameracgiproxy.fcgiSMTP parameter configuration command injection vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/97899

Trust: 0.6

title:Foscam C1 Indoor HD Camera Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71356

Trust: 0.6

sources: CNVD: CNVD-2017-14059 // JVNDB: JVNDB-2017-005148 // CNNVD: CNNVD-201706-1218

EXTERNAL IDS

db:NVDid:CVE-2017-2844

Trust: 3.4

db:TALOSid:TALOS-2017-0346

Trust: 3.1

db:BIDid:99184

Trust: 2.6

db:JVNDBid:JVNDB-2017-005148

Trust: 0.8

db:CNVDid:CNVD-2017-14059

Trust: 0.6

db:CNNVDid:CNNVD-201706-1218

Trust: 0.6

db:SEEBUGid:SSVID-96497

Trust: 0.1

db:VULHUBid:VHN-111047

Trust: 0.1

sources: CNVD: CNVD-2017-14059 // VULHUB: VHN-111047 // BID: 99184 // JVNDB: JVNDB-2017-005148 // CNNVD: CNNVD-201706-1218 // NVD: CVE-2017-2844

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0346

Trust: 2.3

url:http://www.securityfocus.com/bid/99184

Trust: 1.7

url:https://www.talosintelligence.com/vulnerability_reports/talos-2017-0346

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2844

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2844

Trust: 0.8

url:http://www.foscam.com/

Trust: 0.3

url:http://blog.talosintelligence.com/2017/06/foscam-vuln-details.html

Trust: 0.3

sources: CNVD: CNVD-2017-14059 // VULHUB: VHN-111047 // BID: 99184 // JVNDB: JVNDB-2017-005148 // CNNVD: CNNVD-201706-1218 // NVD: CVE-2017-2844

CREDITS

Cory Duplantis, Claudio Bozzato and another member of Cisco Talos.

Trust: 0.3

sources: BID: 99184

SOURCES

db:CNVDid:CNVD-2017-14059
db:VULHUBid:VHN-111047
db:BIDid:99184
db:JVNDBid:JVNDB-2017-005148
db:CNNVDid:CNNVD-201706-1218
db:NVDid:CVE-2017-2844

LAST UPDATE DATE

2025-04-20T22:50:54.035000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-14059date:2017-07-12T00:00:00
db:VULHUBid:VHN-111047date:2019-10-03T00:00:00
db:BIDid:99184date:2017-06-19T00:00:00
db:JVNDBid:JVNDB-2017-005148date:2017-07-19T00:00:00
db:CNNVDid:CNNVD-201706-1218date:2022-04-20T00:00:00
db:NVDid:CVE-2017-2844date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-14059date:2017-07-12T00:00:00
db:VULHUBid:VHN-111047date:2017-06-29T00:00:00
db:BIDid:99184date:2017-06-19T00:00:00
db:JVNDBid:JVNDB-2017-005148date:2017-07-19T00:00:00
db:CNNVDid:CNNVD-201706-1218date:2017-06-30T00:00:00
db:NVDid:CVE-2017-2844date:2017-06-29T17:29:00.180