Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foscam vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2017-2847
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during manual network configuration resulting in command injection. An attacker can simpl...
Foscam C1 Indoor Hd Camera Firmware 2.52.2.37
8.8
CVSSv3
CVE-2017-2848
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during manual network configuration resulting in command injection. An attacker can simpl...
Foscam C1 Indoor Hd Camera Firmware 2.52.2.37
8.8
CVSSv3
CVE-2017-2849
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during NTP server configuration resulting in command injection. An attacker can simply se...
Foscam C1 Indoor Hd Camera Firmware 2.52.2.37
8.8
CVSSv3
CVE-2017-2850
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary characters in the pureftpd.passwd file during a username change, which in turn allows for bypassing chroot...
Foscam C1 Indoor Hd Camera Firmware 2.52.2.37
7.2
CVSSv3
CVE-2017-2851
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can cause a buffer overflow.
Foscam C1 Indoor Hd Camera Firmware 2.52.2.37
NA
CVE-2012-3002
The web interface on (1) Foscam and (2) Wansview IP cameras allows remote malicious users to bypass authentication, and perform administrative functions or read the admin password, via a direct request to an unspecified URL.
Wansview H.264 Hi3510/11/12 Ip Camera -
Foscam H.264 Hi3510/11/12 Ip Camera -
NA
CVE-2013-25743
Core Security Technologies Advisory - Due to improper access restrictions, the FOSCAM FI8620 device allows a remote attacker the ability to browse and access arbitrary files from the directories '/tmpfs/' and '/log/' without requiring authentication. This coul...
9.8
CVSSv3
CVE-2017-5674
A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an malicious user to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) ...
Embedthis Goahead -
1 Github repository
8.8
CVSSv3
CVE-2017-5675
A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an malicious user to inject a command into the receiver1 field...
Embedthis Goahead -
9.8
CVSSv3
CVE-2019-11560
A buffer overflow vulnerability in the streaming server provided by hisilicon in HI3516 models allows an unauthenticated malicious user to remotely run arbitrary code by sending a special RTSP over HTTP packet. The vulnerability was found in many cameras using hisilicon's ha...
Hisilicon Hi3516 Firmware -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7