Логотип exploitDog
bind:CVE-2017-2854
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-2854

Количество 2

Количество 2

nvd логотип

CVE-2017-2854

больше 7 лет назад

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-4cr6-j83q-fcq3

больше 3 лет назад

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-2854

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
0%
Низкий
больше 7 лет назад
github логотип
GHSA-4cr6-j83q-fcq3

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу