A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-14751 A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T15:11:48.344Z

Reserved: 2017-01-31T00:00:00

Link: CVE-2017-5674

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-03-13T06:59:00.370

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-5674

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.