Description
This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28811 | This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command. |
References
History
No history.
Status: PUBLISHED
Assigner: krcert
Published:
Updated: 2024-08-04T09:41:01.886Z
Reserved: 2020-01-22T00:00:00.000Z
Link: CVE-2020-7879
No data.
Status : Modified
Published: 2021-11-30T19:15:08.030
Modified: 2024-11-21T05:37:58.000
Link: CVE-2020-7879
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD