Логотип exploitDog
bind:CVE-2017-2857
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-2857

Количество 2

Количество 2

nvd логотип

CVE-2017-2857

больше 7 лет назад

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-r92x-cvxj-pg46

больше 3 лет назад

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-2857

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
0%
Низкий
больше 7 лет назад
github логотип
GHSA-r92x-cvxj-pg46

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.

CVSS3: 8.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу