ID

VAR-201711-0790


CVE

CVE-2017-2866


TITLE

Circle with Disney In OS Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-009920

DESCRIPTION

An exploitable vulnerability exists in the /api/CONFIG/backup functionality of Circle with Disney. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request to trigger this vulnerability. Circle with Disney Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CirclewithDisney is a network monitoring and management device used by CircleMedia of the United States to monitor children's online behavior

Trust: 2.25

sources: NVD: CVE-2017-2866 // JVNDB: JVNDB-2017-009920 // CNVD: CNVD-2017-32884 // VULHUB: VHN-111069

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-32884

AFFECTED PRODUCTS

vendor:meetcirclemodel:circle with disneyscope:eqversion:2.0.1

Trust: 1.6

vendor:circle mediamodel:with disneyscope: - version: -

Trust: 0.8

vendor:circlemodel:media circle with disneyscope:eqversion:2.0.1

Trust: 0.6

sources: CNVD: CNVD-2017-32884 // JVNDB: JVNDB-2017-009920 // CNNVD: CNNVD-201711-111 // NVD: CVE-2017-2866

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2866
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2866
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-2866
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-32884
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201711-111
value: HIGH

Trust: 0.6

VULHUB: VHN-111069
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-2866
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-32884
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-111069
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2866
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2866
baseSeverity: CRITICAL
baseScore: 9.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.1
impactScore: 6.0
version: 3.0

Trust: 1.0

NVD: CVE-2017-2866
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-32884 // VULHUB: VHN-111069 // JVNDB: JVNDB-2017-009920 // CNNVD: CNNVD-201711-111 // NVD: CVE-2017-2866 // NVD: CVE-2017-2866

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-111069 // JVNDB: JVNDB-2017-009920 // NVD: CVE-2017-2866

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201711-111

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201711-111

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009920

PATCH

title:Top Pageurl:https://meetcircle.com/circle/

Trust: 0.8

title:Patch for CirclewithDisney Command Injection Vulnerability (CNVD-2017-32884)url:https://www.cnvd.org.cn/patchInfo/show/105482

Trust: 0.6

title:Circle with Disney Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76092

Trust: 0.6

sources: CNVD: CNVD-2017-32884 // JVNDB: JVNDB-2017-009920 // CNNVD: CNNVD-201711-111

EXTERNAL IDS

db:NVDid:CVE-2017-2866

Trust: 3.1

db:TALOSid:TALOS-2017-0372

Trust: 3.1

db:JVNDBid:JVNDB-2017-009920

Trust: 0.8

db:CNNVDid:CNNVD-201711-111

Trust: 0.7

db:CNVDid:CNVD-2017-32884

Trust: 0.6

db:SEEBUGid:SSVID-96819

Trust: 0.1

db:VULHUBid:VHN-111069

Trust: 0.1

sources: CNVD: CNVD-2017-32884 // VULHUB: VHN-111069 // JVNDB: JVNDB-2017-009920 // CNNVD: CNNVD-201711-111 // NVD: CVE-2017-2866

REFERENCES

url:https://www.talosintelligence.com/vulnerability_reports/talos-2017-0372

Trust: 2.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2866

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2866

Trust: 0.8

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0372

Trust: 0.6

sources: CNVD: CNVD-2017-32884 // VULHUB: VHN-111069 // JVNDB: JVNDB-2017-009920 // CNNVD: CNNVD-201711-111 // NVD: CVE-2017-2866

CREDITS

Yves Younan, Cory Duplantis,Marcin 'Icewall' Noga, Claudio Bozzato, and Richard Johnson Cisco Talos, Aleksandar Nikolic, Lilith Wyatt <(^_^)>

Trust: 0.6

sources: CNNVD: CNNVD-201711-111

SOURCES

db:CNVDid:CNVD-2017-32884
db:VULHUBid:VHN-111069
db:JVNDBid:JVNDB-2017-009920
db:CNNVDid:CNNVD-201711-111
db:NVDid:CVE-2017-2866

LAST UPDATE DATE

2025-04-20T23:03:57.391000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-32884date:2017-11-07T00:00:00
db:VULHUBid:VHN-111069date:2017-11-27T00:00:00
db:JVNDBid:JVNDB-2017-009920date:2017-11-28T00:00:00
db:CNNVDid:CNNVD-201711-111date:2022-04-20T00:00:00
db:NVDid:CVE-2017-2866date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-32884date:2017-11-07T00:00:00
db:VULHUBid:VHN-111069date:2017-11-07T00:00:00
db:JVNDBid:JVNDB-2017-009920date:2017-11-28T00:00:00
db:CNNVDid:CNNVD-201711-111date:2017-10-31T00:00:00
db:NVDid:CVE-2017-2866date:2017-11-07T16:29:00.467