This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-28811 This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: krcert

Published:

Updated: 2024-08-04T09:41:01.886Z

Reserved: 2020-01-22T00:00:00

Link: CVE-2020-7879

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-30T19:15:08.030

Modified: 2024-11-21T05:37:58.000

Link: CVE-2020-7879

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.