Description
This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
Published: 2021-11-30
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-28811 This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
History

No history.

Subscriptions

Iptime C200 C200 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: krcert

Published:

Updated: 2024-08-04T09:41:01.886Z

Reserved: 2020-01-22T00:00:00.000Z

Link: CVE-2020-7879

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-30T19:15:08.030

Modified: 2024-11-21T05:37:58.000

Link: CVE-2020-7879

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses