Search criteria
9 vulnerabilities found for fi9928p_firmware by foscam
FKIE_CVE-2018-6832
Vulnerability from fkie_nvd - Published: 2018-07-09 17:29 - Updated: 2024-11-21 04:11
Severity ?
Summary
Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD83C0B-65F1-4E21-ACD7-2CCC94C292CE",
"versionEndIncluding": "2.82.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1_lite:3:*:*:*:*:*:*:*",
"matchCriteriaId": "D75F9D59-5DAD-417E-ABEA-77D13C6BCEC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15029DF1-E55A-4203-90C1-704DFC9AAA68",
"versionEndIncluding": "2.82.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1:3:*:*:*:*:*:*:*",
"matchCriteriaId": "FF3A68F0-A5EF-4D2F-A5CE-1B59727CA61F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C75AF70-F1DC-46BE-B245-F0B21CAB734E",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9800p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "05EE5EEA-01D4-4A94-A3EF-C74A757367BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "430EC053-154B-4708-AEF6-37F7128F5E6E",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821ep:2:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5DA403-9F2E-48FF-B275-B8915102E019",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEECDE7-5505-44B5-8C57-AF4975FF20D3",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "68D19276-18E3-485A-B99A-572AA53231C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A18EFB9-4157-4CE9-AC7D-014DD17D781D",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C9A4A2-CB00-4E65-88B4-C836C39DF254",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06386F22-363E-48A9-943A-14CEC5A23554",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "887BD7E7-61A3-4776-BEE1-D74903D786A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A89F4040-CC4E-44CF-97FE-9647E7BD0B02",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F616DB3E-95FA-4679-A831-036AA3CF25EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A89F4040-CC4E-44CF-97FE-9647E7BD0B02",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1:2:*:*:*:*:*:*:*",
"matchCriteriaId": "66D71821-41F9-47CE-9457-C7CDD477B0CE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C53D55-A41A-45BC-97E9-40DA68F9634E",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1_lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86D412F5-7EC5-4E7B-94E0-3C1A31721A51",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C53D55-A41A-45BC-97E9-40DA68F9634E",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1_lite:2:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F5E3C3-109D-48ED-BDA9-CE37CDE53E2E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1F75C7-670C-446E-86DF-ECA3BFA3A50A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9800p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E926F733-4CAB-454C-AB0A-79B41EC2AE8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1F75C7-670C-446E-86DF-ECA3BFA3A50A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9800p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "B56AB146-7FED-4E70-ADA0-DAC545DE08CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1921AC5-2220-4145-88AF-2E3DF38D876A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "C512F2C2-FC60-4CF4-A375-DF732171DB94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1921AC5-2220-4145-88AF-2E3DF38D876A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "C000341D-B0D8-4061-9254-1A1BC6FAAFCA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE71AEBD-190F-4735-A371-2B7A7C599ADC",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9851p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "93A595F8-AD93-43C4-90AB-5ED42B44AAE5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35657C3A-4542-48D5-BE95-42446F3DFC75",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9815p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "110D1173-32FA-4633-B0D0-683F9BB9B37E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35657C3A-4542-48D5-BE95-42446F3DFC75",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9815p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FFA07CC-6BFF-49AA-B0BE-71AD6A58EF15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4692D1B-DFB8-470D-BAA2-F44ABD30E3FE",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9816p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05E18E04-8157-4DB8-81FD-BEBE158CC50F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4692D1B-DFB8-470D-BAA2-F44ABD30E3FE",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9816p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "2330CCB3-5532-476F-A256-CE71F199619A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:r2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A42DC5-E9E5-4721-922E-8689F88F41B3",
"versionEndIncluding": "2.71.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:r2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D2BDAF-F52E-456B-ACD7-CB18783F2B98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:r4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70B7015A-D30F-4A76-A99A-2965E30D96C1",
"versionEndIncluding": "2.71.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:r4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19978948-E673-4EED-9DF9-DC2AA80012AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2224156E-710A-49D9-934E-5B4205810D7E",
"versionEndIncluding": "2.72.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "107D84D0-9D16-4930-A312-38B7586B4B4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9961ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C31BA194-ED23-40A0-87C5-7A517DA069C2",
"versionEndIncluding": "2.72.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9961ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E91711DD-3322-415F-A897-F513FDA4993E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9900ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "443A20F7-BAE7-487B-90C2-2BDF2B590EDB",
"versionEndIncluding": "2.74.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9900ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5921D63E-3E99-4BD2-BB5A-60EEB30CFE37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9900p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97F02FAF-41D9-42C0-91A1-2C18ED1A456C",
"versionEndIncluding": "2.74.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9900p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "322C5F2F-BA14-4FC3-BB19-1CC757E69AEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9901ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8537408-A362-4FA7-852C-877519728FCB",
"versionEndIncluding": "2.74.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9901ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "453FF7DD-B7DE-4C8E-A441-1801C739461C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9928p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD1DC0C-8B2C-494E-8BE0-6B78A246F786",
"versionEndIncluding": "2.74.1.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9928p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "872A1831-857E-4068-94E6-EA201DC6630B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F322AF-8897-47D3-8167-8CFBC0CC1F6A",
"versionEndIncluding": "2.22.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8251A999-F9FC-41DA-9115-C2D6BB47CC6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9853ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1C41A4-8F24-4877-A747-BC19AF59C8D9",
"versionEndIncluding": "2.22.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9853ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C245B5-A3BD-426A-B62F-7C833AB6348E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "635D1BF5-6310-4B15-88E6-3B22A3CF971F",
"versionEndIncluding": "2.24.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61370852-C2B4-4E42-9DBD-45334DB7ACAE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "87F2D7D4-E7D5-44F0-A9E2-4F4BB41AD82B",
"versionEndIncluding": "2.24.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9851p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93FB966A-5705-4A6C-8BDD-CF7F7A9F7E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDA71109-8772-4F8D-A4CE-4FA425284F5E",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "1607312E-1E20-4464-A254-2FE9F8BCB7C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F115B0-E0E3-4638-A972-B592A10ECDCB",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "89EA47D4-017E-4B9A-9E84-2CADF76EC657",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D98FD91A-6C58-4782-9B14-B672826F5DE2",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "780F61A2-C686-42EC-9B5E-6CE48FF862FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F9C2E0-A85B-452E-9E1A-C2CE46601E96",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5D78298-EBA9-4873-B633-394B5B35293D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAD7AAB7-799D-4BC0-9F1F-99C65DD32A82",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821w:2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2876219-1B14-416D-8943-2F96EB899887",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0747442B-B31F-4420-8556-2D100E7723D3",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "876D71AC-AC94-42BE-9221-16A94572A682",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98BAC6D3-380C-4807-8B71-27D0054CA03A",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4EAE8E-7961-4157-87AE-0F4E123C8ABE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CBBC284-5CD3-49FA-9598-1BA060EB6224",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C30877A-A8BA-45DB-9923-FD8881679430",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A872D342-E7FD-40AF-8C1D-1E1495B5BA3D",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34735A5D-D535-4DEC-826C-74903C940991",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD81C2D-8AF5-4949-A4E1-77461F7DC790",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F62714-1CD1-4154-B718-C53828518F8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9818w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7162BA-F775-4EBF-99E4-73E1386782A5",
"versionEndIncluding": "2.13.2.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9818w:2:*:*:*:*:*:*:*",
"matchCriteriaId": "A9FBC739-39EF-4CF9-BD88-79F0DBD6BBE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9805w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F198C6-7BDC-45F4-9BF8-B7D87A4F1BD8",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9805w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB00AB63-4486-4F22-885E-9B0FEEBA933E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9804w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F501FDDC-F26C-483A-9420-CC677391453C",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9804w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4EE430C-B7CA-4733-B405-E4B337E74D0B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9804p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12CD4E0D-0D47-464C-BF5B-07AB33E57B90",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9804p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDCBF332-A0AE-4144-9835-580D3DC32A9E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9805e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "259F3486-7A93-4644-8CFC-28968A75E690",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9805e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A336D4-B6F0-4609-AB74-C83D1C155B44",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9805p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A9A8678-32E0-427A-BF26-EED3DA092429",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9805p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55CBAD5E-6B89-4BE6-88B1-E4F2A11C22F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36563823-99C4-43B4-9234-8055B2EABAC8",
"versionEndIncluding": "2.13.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9828p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F512FC9B-6FB7-4AD3-A442-D6028F9A60ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9828w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "233D2905-BFC7-4CE5-BDE2-409145F7F387",
"versionEndIncluding": "2.13.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9828w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1745D6B-EB83-4A9D-AAFF-A459224F5156",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE1E78A-1CED-40B4-AA09-34352F5D070F",
"versionEndIncluding": "2.11.1.133",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9828p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C34A4-2DA7-4A1B-A41F-688FCE6E584B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n getSWFlag en c\u00e1maras Foscam C1 Lite V3 y C1 V3 con versiones de firmware 2.82.2.33 y anteriores, FI9800P V3, FI9803P V4, FI9851P V3 y FI9853EP V2 2.84.2.33 y anteriores, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3 y FI9831P V3 2.81.2.33 y anteriores, C1, C1 V2, C1 Lite y C1 Lite V2 2.52.2.47 y anteriores, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3 y FI9851P V2 2.54.2.47 y anteriores, FI9815P, FI9815P V2, FI9816P y FI9816P V2, 2.51.2.47 y anteriores, R2 and R4 2.71.1.59 y anteriores, C2 y FI9961EP 2.72.1.59 y anteriores, FI9900EP, FI9900P y FI9901EP 2.74.1.59 y anteriores, FI9928P 2.74.1.58 y anteriores, FI9803EP y FI9853EP 2.22.2.31 y anteriores, FI9803P y FI9851P 2.24.2.31 y anteriores, FI9821P V2, FI9826P V2, FI9831P V2 y FI9821EP 2.21.2.31 y anteriores, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P y FI9826P 2.11.1.120 y anteriores, FI9818W V2 2.13.2.120 y anteriores, FI9805W, FI9804W, FI9804P, FI9805E y FI9805P 2.14.1.120 y anteriores, FI9828P y FI9828W 2.13.1.120 y anteriores y FI9828P V2 2.11.1.133 y anteriores permite que los atacantes remotos provoquen una denegaci\u00f3n de servicio (cierre inesperado y reinicio) mediante el par\u00e1metro callbackJson."
}
],
"id": "CVE-2018-6832",
"lastModified": "2024-11-21T04:11:15.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-09T17:29:00.323",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-6830
Vulnerability from fkie_nvd - Published: 2018-07-09 17:29 - Updated: 2024-11-21 04:11
Severity ?
Summary
Directory traversal vulnerability in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to delete arbitrary files via a .. (dot dot) in the URI path component.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD83C0B-65F1-4E21-ACD7-2CCC94C292CE",
"versionEndIncluding": "2.82.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1_lite:3:*:*:*:*:*:*:*",
"matchCriteriaId": "D75F9D59-5DAD-417E-ABEA-77D13C6BCEC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15029DF1-E55A-4203-90C1-704DFC9AAA68",
"versionEndIncluding": "2.82.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1:3:*:*:*:*:*:*:*",
"matchCriteriaId": "FF3A68F0-A5EF-4D2F-A5CE-1B59727CA61F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C75AF70-F1DC-46BE-B245-F0B21CAB734E",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9800p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "05EE5EEA-01D4-4A94-A3EF-C74A757367BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "430EC053-154B-4708-AEF6-37F7128F5E6E",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821ep:2:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5DA403-9F2E-48FF-B275-B8915102E019",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEECDE7-5505-44B5-8C57-AF4975FF20D3",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "68D19276-18E3-485A-B99A-572AA53231C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A18EFB9-4157-4CE9-AC7D-014DD17D781D",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C9A4A2-CB00-4E65-88B4-C836C39DF254",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06386F22-363E-48A9-943A-14CEC5A23554",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "887BD7E7-61A3-4776-BEE1-D74903D786A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A89F4040-CC4E-44CF-97FE-9647E7BD0B02",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F616DB3E-95FA-4679-A831-036AA3CF25EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A89F4040-CC4E-44CF-97FE-9647E7BD0B02",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1:2:*:*:*:*:*:*:*",
"matchCriteriaId": "66D71821-41F9-47CE-9457-C7CDD477B0CE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C53D55-A41A-45BC-97E9-40DA68F9634E",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1_lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86D412F5-7EC5-4E7B-94E0-3C1A31721A51",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C53D55-A41A-45BC-97E9-40DA68F9634E",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1_lite:2:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F5E3C3-109D-48ED-BDA9-CE37CDE53E2E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1F75C7-670C-446E-86DF-ECA3BFA3A50A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9800p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E926F733-4CAB-454C-AB0A-79B41EC2AE8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1F75C7-670C-446E-86DF-ECA3BFA3A50A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9800p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "B56AB146-7FED-4E70-ADA0-DAC545DE08CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1921AC5-2220-4145-88AF-2E3DF38D876A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "C512F2C2-FC60-4CF4-A375-DF732171DB94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1921AC5-2220-4145-88AF-2E3DF38D876A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "C000341D-B0D8-4061-9254-1A1BC6FAAFCA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE71AEBD-190F-4735-A371-2B7A7C599ADC",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9851p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "93A595F8-AD93-43C4-90AB-5ED42B44AAE5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35657C3A-4542-48D5-BE95-42446F3DFC75",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9815p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "110D1173-32FA-4633-B0D0-683F9BB9B37E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35657C3A-4542-48D5-BE95-42446F3DFC75",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9815p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FFA07CC-6BFF-49AA-B0BE-71AD6A58EF15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4692D1B-DFB8-470D-BAA2-F44ABD30E3FE",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9816p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05E18E04-8157-4DB8-81FD-BEBE158CC50F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4692D1B-DFB8-470D-BAA2-F44ABD30E3FE",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9816p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "2330CCB3-5532-476F-A256-CE71F199619A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:r2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A42DC5-E9E5-4721-922E-8689F88F41B3",
"versionEndIncluding": "2.71.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:r2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D2BDAF-F52E-456B-ACD7-CB18783F2B98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:r4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70B7015A-D30F-4A76-A99A-2965E30D96C1",
"versionEndIncluding": "2.71.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:r4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19978948-E673-4EED-9DF9-DC2AA80012AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2224156E-710A-49D9-934E-5B4205810D7E",
"versionEndIncluding": "2.72.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "107D84D0-9D16-4930-A312-38B7586B4B4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9961ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C31BA194-ED23-40A0-87C5-7A517DA069C2",
"versionEndIncluding": "2.72.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9961ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E91711DD-3322-415F-A897-F513FDA4993E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9900ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "443A20F7-BAE7-487B-90C2-2BDF2B590EDB",
"versionEndIncluding": "2.74.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9900ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5921D63E-3E99-4BD2-BB5A-60EEB30CFE37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9900p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97F02FAF-41D9-42C0-91A1-2C18ED1A456C",
"versionEndIncluding": "2.74.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9900p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "322C5F2F-BA14-4FC3-BB19-1CC757E69AEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9901ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8537408-A362-4FA7-852C-877519728FCB",
"versionEndIncluding": "2.74.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9901ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "453FF7DD-B7DE-4C8E-A441-1801C739461C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9928p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD1DC0C-8B2C-494E-8BE0-6B78A246F786",
"versionEndIncluding": "2.74.1.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9928p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "872A1831-857E-4068-94E6-EA201DC6630B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F322AF-8897-47D3-8167-8CFBC0CC1F6A",
"versionEndIncluding": "2.22.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8251A999-F9FC-41DA-9115-C2D6BB47CC6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9853ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1C41A4-8F24-4877-A747-BC19AF59C8D9",
"versionEndIncluding": "2.22.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9853ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C245B5-A3BD-426A-B62F-7C833AB6348E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "635D1BF5-6310-4B15-88E6-3B22A3CF971F",
"versionEndIncluding": "2.24.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61370852-C2B4-4E42-9DBD-45334DB7ACAE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "87F2D7D4-E7D5-44F0-A9E2-4F4BB41AD82B",
"versionEndIncluding": "2.24.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9851p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93FB966A-5705-4A6C-8BDD-CF7F7A9F7E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDA71109-8772-4F8D-A4CE-4FA425284F5E",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "1607312E-1E20-4464-A254-2FE9F8BCB7C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F115B0-E0E3-4638-A972-B592A10ECDCB",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "89EA47D4-017E-4B9A-9E84-2CADF76EC657",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D98FD91A-6C58-4782-9B14-B672826F5DE2",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "780F61A2-C686-42EC-9B5E-6CE48FF862FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F9C2E0-A85B-452E-9E1A-C2CE46601E96",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5D78298-EBA9-4873-B633-394B5B35293D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAD7AAB7-799D-4BC0-9F1F-99C65DD32A82",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821w:2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2876219-1B14-416D-8943-2F96EB899887",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0747442B-B31F-4420-8556-2D100E7723D3",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "876D71AC-AC94-42BE-9221-16A94572A682",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98BAC6D3-380C-4807-8B71-27D0054CA03A",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4EAE8E-7961-4157-87AE-0F4E123C8ABE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CBBC284-5CD3-49FA-9598-1BA060EB6224",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C30877A-A8BA-45DB-9923-FD8881679430",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A872D342-E7FD-40AF-8C1D-1E1495B5BA3D",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34735A5D-D535-4DEC-826C-74903C940991",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD81C2D-8AF5-4949-A4E1-77461F7DC790",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F62714-1CD1-4154-B718-C53828518F8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9818w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7162BA-F775-4EBF-99E4-73E1386782A5",
"versionEndIncluding": "2.13.2.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9818w:2:*:*:*:*:*:*:*",
"matchCriteriaId": "A9FBC739-39EF-4CF9-BD88-79F0DBD6BBE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9805w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F198C6-7BDC-45F4-9BF8-B7D87A4F1BD8",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9805w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB00AB63-4486-4F22-885E-9B0FEEBA933E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9804w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F501FDDC-F26C-483A-9420-CC677391453C",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9804w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4EE430C-B7CA-4733-B405-E4B337E74D0B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9804p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12CD4E0D-0D47-464C-BF5B-07AB33E57B90",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9804p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDCBF332-A0AE-4144-9835-580D3DC32A9E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9805e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "259F3486-7A93-4644-8CFC-28968A75E690",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9805e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A336D4-B6F0-4609-AB74-C83D1C155B44",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9805p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A9A8678-32E0-427A-BF26-EED3DA092429",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9805p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55CBAD5E-6B89-4BE6-88B1-E4F2A11C22F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36563823-99C4-43B4-9234-8055B2EABAC8",
"versionEndIncluding": "2.13.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9828p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F512FC9B-6FB7-4AD3-A442-D6028F9A60ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9828w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "233D2905-BFC7-4CE5-BDE2-409145F7F387",
"versionEndIncluding": "2.13.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9828w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1745D6B-EB83-4A9D-AAFF-A459224F5156",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE1E78A-1CED-40B4-AA09-34352F5D070F",
"versionEndIncluding": "2.11.1.133",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9828p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C34A4-2DA7-4A1B-A41F-688FCE6E584B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to delete arbitrary files via a .. (dot dot) in the URI path component."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en c\u00e1maras Foscam C1 Lite V3 y C1 V3 con versiones de firmware 2.82.2.33 y anteriores, FI9800P V3, FI9803P V4, FI9851P V3 y FI9853EP V2 2.84.2.33 y anteriores, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3 y FI9831P V3 2.81.2.33 y anteriores, C1, C1 V2, C1 Lite y C1 Lite V2 2.52.2.47 y anteriores, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3 y FI9851P V2 2.54.2.47 y anteriores, FI9815P, FI9815P V2, FI9816P y FI9816P V2, 2.51.2.47 y anteriores, R2 and R4 2.71.1.59 y anteriores, C2 y FI9961EP 2.72.1.59 y anteriores, FI9900EP, FI9900P y FI9901EP 2.74.1.59 y anteriores, FI9928P 2.74.1.58 y anteriores, FI9803EP y FI9853EP 2.22.2.31 y anteriores, FI9803P y FI9851P 2.24.2.31 y anteriores, FI9821P V2, FI9826P V2, FI9831P V2 y FI9821EP 2.21.2.31 y anteriores, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P y FI9826P 2.11.1.120 y anteriores, FI9818W V2 2.13.2.120 y anteriores, FI9805W, FI9804W, FI9804P, FI9805E y FI9805P 2.14.1.120 y anteriores, FI9828P y FI9828W 2.13.1.120 y anteriores y FI9828P V2 2.11.1.133 y anteriores permite que los atacantes remotos borren archivos arbitrarios mediante un .. (punto punto) en el componente de ruta del URI."
}
],
"id": "CVE-2018-6830",
"lastModified": "2024-11-21T04:11:15.567",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-09T17:29:00.213",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-6831
Vulnerability from fkie_nvd - Published: 2018-07-09 17:29 - Updated: 2024-11-21 04:11
Severity ?
Summary
The setSystemTime function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote authenticated users to execute arbitrary commands via a ';' in the ntpServer argument. NOTE: this issue exists because of an incomplete fix for CVE-2017-2849.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD83C0B-65F1-4E21-ACD7-2CCC94C292CE",
"versionEndIncluding": "2.82.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1_lite:3:*:*:*:*:*:*:*",
"matchCriteriaId": "D75F9D59-5DAD-417E-ABEA-77D13C6BCEC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15029DF1-E55A-4203-90C1-704DFC9AAA68",
"versionEndIncluding": "2.82.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1:3:*:*:*:*:*:*:*",
"matchCriteriaId": "FF3A68F0-A5EF-4D2F-A5CE-1B59727CA61F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C75AF70-F1DC-46BE-B245-F0B21CAB734E",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9800p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "05EE5EEA-01D4-4A94-A3EF-C74A757367BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "430EC053-154B-4708-AEF6-37F7128F5E6E",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821ep:2:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5DA403-9F2E-48FF-B275-B8915102E019",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEECDE7-5505-44B5-8C57-AF4975FF20D3",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "68D19276-18E3-485A-B99A-572AA53231C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A18EFB9-4157-4CE9-AC7D-014DD17D781D",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C9A4A2-CB00-4E65-88B4-C836C39DF254",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06386F22-363E-48A9-943A-14CEC5A23554",
"versionEndIncluding": "2.81.2.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "887BD7E7-61A3-4776-BEE1-D74903D786A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A89F4040-CC4E-44CF-97FE-9647E7BD0B02",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F616DB3E-95FA-4679-A831-036AA3CF25EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A89F4040-CC4E-44CF-97FE-9647E7BD0B02",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1:2:*:*:*:*:*:*:*",
"matchCriteriaId": "66D71821-41F9-47CE-9457-C7CDD477B0CE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C53D55-A41A-45BC-97E9-40DA68F9634E",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1_lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86D412F5-7EC5-4E7B-94E0-3C1A31721A51",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C53D55-A41A-45BC-97E9-40DA68F9634E",
"versionEndIncluding": "2.52.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c1_lite:2:*:*:*:*:*:*:*",
"matchCriteriaId": "E1F5E3C3-109D-48ED-BDA9-CE37CDE53E2E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1F75C7-670C-446E-86DF-ECA3BFA3A50A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9800p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E926F733-4CAB-454C-AB0A-79B41EC2AE8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1F75C7-670C-446E-86DF-ECA3BFA3A50A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9800p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "B56AB146-7FED-4E70-ADA0-DAC545DE08CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1921AC5-2220-4145-88AF-2E3DF38D876A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "C512F2C2-FC60-4CF4-A375-DF732171DB94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1921AC5-2220-4145-88AF-2E3DF38D876A",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803p:3:*:*:*:*:*:*:*",
"matchCriteriaId": "C000341D-B0D8-4061-9254-1A1BC6FAAFCA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE71AEBD-190F-4735-A371-2B7A7C599ADC",
"versionEndIncluding": "2.54.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9851p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "93A595F8-AD93-43C4-90AB-5ED42B44AAE5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35657C3A-4542-48D5-BE95-42446F3DFC75",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9815p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "110D1173-32FA-4633-B0D0-683F9BB9B37E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35657C3A-4542-48D5-BE95-42446F3DFC75",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9815p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FFA07CC-6BFF-49AA-B0BE-71AD6A58EF15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4692D1B-DFB8-470D-BAA2-F44ABD30E3FE",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9816p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05E18E04-8157-4DB8-81FD-BEBE158CC50F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4692D1B-DFB8-470D-BAA2-F44ABD30E3FE",
"versionEndIncluding": "2.51.2.47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9816p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "2330CCB3-5532-476F-A256-CE71F199619A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:r2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A42DC5-E9E5-4721-922E-8689F88F41B3",
"versionEndIncluding": "2.71.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:r2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D2BDAF-F52E-456B-ACD7-CB18783F2B98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:r4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70B7015A-D30F-4A76-A99A-2965E30D96C1",
"versionEndIncluding": "2.71.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:r4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19978948-E673-4EED-9DF9-DC2AA80012AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:c2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2224156E-710A-49D9-934E-5B4205810D7E",
"versionEndIncluding": "2.72.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "107D84D0-9D16-4930-A312-38B7586B4B4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9961ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C31BA194-ED23-40A0-87C5-7A517DA069C2",
"versionEndIncluding": "2.72.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9961ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E91711DD-3322-415F-A897-F513FDA4993E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9900ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "443A20F7-BAE7-487B-90C2-2BDF2B590EDB",
"versionEndIncluding": "2.74.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9900ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5921D63E-3E99-4BD2-BB5A-60EEB30CFE37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9900p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97F02FAF-41D9-42C0-91A1-2C18ED1A456C",
"versionEndIncluding": "2.74.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9900p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "322C5F2F-BA14-4FC3-BB19-1CC757E69AEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9901ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8537408-A362-4FA7-852C-877519728FCB",
"versionEndIncluding": "2.74.1.59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9901ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "453FF7DD-B7DE-4C8E-A441-1801C739461C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9928p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD1DC0C-8B2C-494E-8BE0-6B78A246F786",
"versionEndIncluding": "2.74.1.58",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9928p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "872A1831-857E-4068-94E6-EA201DC6630B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F322AF-8897-47D3-8167-8CFBC0CC1F6A",
"versionEndIncluding": "2.22.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8251A999-F9FC-41DA-9115-C2D6BB47CC6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9853ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1C41A4-8F24-4877-A747-BC19AF59C8D9",
"versionEndIncluding": "2.22.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9853ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C245B5-A3BD-426A-B62F-7C833AB6348E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "635D1BF5-6310-4B15-88E6-3B22A3CF971F",
"versionEndIncluding": "2.24.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9803p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61370852-C2B4-4E42-9DBD-45334DB7ACAE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "87F2D7D4-E7D5-44F0-A9E2-4F4BB41AD82B",
"versionEndIncluding": "2.24.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9851p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93FB966A-5705-4A6C-8BDD-CF7F7A9F7E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDA71109-8772-4F8D-A4CE-4FA425284F5E",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "1607312E-1E20-4464-A254-2FE9F8BCB7C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13F115B0-E0E3-4638-A972-B592A10ECDCB",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "89EA47D4-017E-4B9A-9E84-2CADF76EC657",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D98FD91A-6C58-4782-9B14-B672826F5DE2",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "780F61A2-C686-42EC-9B5E-6CE48FF862FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F9C2E0-A85B-452E-9E1A-C2CE46601E96",
"versionEndIncluding": "2.21.2.31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821ep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5D78298-EBA9-4873-B633-394B5B35293D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAD7AAB7-799D-4BC0-9F1F-99C65DD32A82",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821w:2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2876219-1B14-416D-8943-2F96EB899887",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0747442B-B31F-4420-8556-2D100E7723D3",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "876D71AC-AC94-42BE-9221-16A94572A682",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98BAC6D3-380C-4807-8B71-27D0054CA03A",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4EAE8E-7961-4157-87AE-0F4E123C8ABE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CBBC284-5CD3-49FA-9598-1BA060EB6224",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9821p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C30877A-A8BA-45DB-9923-FD8881679430",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A872D342-E7FD-40AF-8C1D-1E1495B5BA3D",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9831p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34735A5D-D535-4DEC-826C-74903C940991",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD81C2D-8AF5-4949-A4E1-77461F7DC790",
"versionEndIncluding": "2.11.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9826p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F62714-1CD1-4154-B718-C53828518F8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9818w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7162BA-F775-4EBF-99E4-73E1386782A5",
"versionEndIncluding": "2.13.2.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9818w:2:*:*:*:*:*:*:*",
"matchCriteriaId": "A9FBC739-39EF-4CF9-BD88-79F0DBD6BBE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9805w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F198C6-7BDC-45F4-9BF8-B7D87A4F1BD8",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9805w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB00AB63-4486-4F22-885E-9B0FEEBA933E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9804w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F501FDDC-F26C-483A-9420-CC677391453C",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9804w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4EE430C-B7CA-4733-B405-E4B337E74D0B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9804p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12CD4E0D-0D47-464C-BF5B-07AB33E57B90",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9804p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDCBF332-A0AE-4144-9835-580D3DC32A9E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9805e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "259F3486-7A93-4644-8CFC-28968A75E690",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9805e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A336D4-B6F0-4609-AB74-C83D1C155B44",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9805p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A9A8678-32E0-427A-BF26-EED3DA092429",
"versionEndIncluding": "2.14.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9805p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55CBAD5E-6B89-4BE6-88B1-E4F2A11C22F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36563823-99C4-43B4-9234-8055B2EABAC8",
"versionEndIncluding": "2.13.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9828p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F512FC9B-6FB7-4AD3-A442-D6028F9A60ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9828w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "233D2905-BFC7-4CE5-BDE2-409145F7F387",
"versionEndIncluding": "2.13.1.120",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9828w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1745D6B-EB83-4A9D-AAFF-A459224F5156",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE1E78A-1CED-40B4-AA09-34352F5D070F",
"versionEndIncluding": "2.11.1.133",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:foscam:fi9828p:2:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C34A4-2DA7-4A1B-A41F-688FCE6E584B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The setSystemTime function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote authenticated users to execute arbitrary commands via a \u0027;\u0027 in the ntpServer argument. NOTE: this issue exists because of an incomplete fix for CVE-2017-2849."
},
{
"lang": "es",
"value": "La funci\u00f3n setSystemTime en c\u00e1maras Foscam C1 Lite V3 y C1 V3 con versiones de firmware 2.82.2.33 y anteriores, FI9800P V3, FI9803P V4, FI9851P V3 y FI9853EP V2 2.84.2.33 y anteriores, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3 y FI9831P V3 2.81.2.33 y anteriores, C1, C1 V2, C1 Lite y C1 Lite V2 2.52.2.47 y anteriores, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3 y FI9851P V2 2.54.2.47 y anteriores, FI9815P, FI9815P V2, FI9816P y FI9816P V2, 2.51.2.47 y anteriores, R2 and R4 2.71.1.59 y anteriores, C2 y FI9961EP 2.72.1.59 y anteriores, FI9900EP, FI9900P y FI9901EP 2.74.1.59 y anteriores, FI9928P 2.74.1.58 y anteriores, FI9803EP y FI9853EP 2.22.2.31 y anteriores, FI9803P y FI9851P 2.24.2.31 y anteriores, FI9821P V2, FI9826P V2, FI9831P V2 y FI9821EP 2.21.2.31 y anteriores, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P y FI9826P 2.11.1.120 y anteriores, FI9818W V2 2.13.2.120 y anteriores, FI9805W, FI9804W, FI9804P, FI9805E y FI9805P 2.14.1.120 y anteriores, FI9828P y FI9828W 2.13.1.120 y anteriores y FI9828P V2 2.11.1.133 y anteriores permite que los usuarios autenticados remotos ejecuten comandos arbitrarios mediante un \";\" en el argumento ntpServer. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2017-2849."
}
],
"id": "CVE-2018-6831",
"lastModified": "2024-11-21T04:11:15.770",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-09T17:29:00.260",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2018-6831 (GCVE-0-2018-6831)
Vulnerability from cvelistv5 – Published: 2018-07-09 17:00 – Updated: 2024-08-05 06:17
VLAI?
Summary
The setSystemTime function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote authenticated users to execute arbitrary commands via a ';' in the ntpServer argument. NOTE: this issue exists because of an incomplete fix for CVE-2017-2849.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:17:15.866Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-06-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The setSystemTime function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote authenticated users to execute arbitrary commands via a \u0027;\u0027 in the ntpServer argument. NOTE: this issue exists because of an incomplete fix for CVE-2017-2849."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-09T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6831",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The setSystemTime function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote authenticated users to execute arbitrary commands via a \u0027;\u0027 in the ntpServer argument. NOTE: this issue exists because of an incomplete fix for CVE-2017-2849."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html",
"refsource": "CONFIRM",
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"name": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/",
"refsource": "MISC",
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-6831",
"datePublished": "2018-07-09T17:00:00",
"dateReserved": "2018-02-07T00:00:00",
"dateUpdated": "2024-08-05T06:17:15.866Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-6830 (GCVE-0-2018-6830)
Vulnerability from cvelistv5 – Published: 2018-07-09 17:00 – Updated: 2024-08-05 06:17
VLAI?
Summary
Directory traversal vulnerability in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to delete arbitrary files via a .. (dot dot) in the URI path component.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:17:15.812Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-06-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to delete arbitrary files via a .. (dot dot) in the URI path component."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-09T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6830",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to delete arbitrary files via a .. (dot dot) in the URI path component."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html",
"refsource": "CONFIRM",
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"name": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/",
"refsource": "MISC",
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-6830",
"datePublished": "2018-07-09T17:00:00",
"dateReserved": "2018-02-07T00:00:00",
"dateUpdated": "2024-08-05T06:17:15.812Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-6832 (GCVE-0-2018-6832)
Vulnerability from cvelistv5 – Published: 2018-07-09 17:00 – Updated: 2024-08-05 06:17
VLAI?
Summary
Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:17:15.872Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-06-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-09T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6832",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html",
"refsource": "CONFIRM",
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"name": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/",
"refsource": "MISC",
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-6832",
"datePublished": "2018-07-09T17:00:00",
"dateReserved": "2018-02-07T00:00:00",
"dateUpdated": "2024-08-05T06:17:15.872Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-6831 (GCVE-0-2018-6831)
Vulnerability from nvd – Published: 2018-07-09 17:00 – Updated: 2024-08-05 06:17
VLAI?
Summary
The setSystemTime function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote authenticated users to execute arbitrary commands via a ';' in the ntpServer argument. NOTE: this issue exists because of an incomplete fix for CVE-2017-2849.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:17:15.866Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-06-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The setSystemTime function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote authenticated users to execute arbitrary commands via a \u0027;\u0027 in the ntpServer argument. NOTE: this issue exists because of an incomplete fix for CVE-2017-2849."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-09T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6831",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The setSystemTime function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote authenticated users to execute arbitrary commands via a \u0027;\u0027 in the ntpServer argument. NOTE: this issue exists because of an incomplete fix for CVE-2017-2849."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html",
"refsource": "CONFIRM",
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"name": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/",
"refsource": "MISC",
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-6831",
"datePublished": "2018-07-09T17:00:00",
"dateReserved": "2018-02-07T00:00:00",
"dateUpdated": "2024-08-05T06:17:15.866Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-6830 (GCVE-0-2018-6830)
Vulnerability from nvd – Published: 2018-07-09 17:00 – Updated: 2024-08-05 06:17
VLAI?
Summary
Directory traversal vulnerability in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to delete arbitrary files via a .. (dot dot) in the URI path component.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:17:15.812Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-06-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to delete arbitrary files via a .. (dot dot) in the URI path component."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-09T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6830",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to delete arbitrary files via a .. (dot dot) in the URI path component."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html",
"refsource": "CONFIRM",
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"name": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/",
"refsource": "MISC",
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-6830",
"datePublished": "2018-07-09T17:00:00",
"dateReserved": "2018-02-07T00:00:00",
"dateUpdated": "2024-08-05T06:17:15.812Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-6832 (GCVE-0-2018-6832)
Vulnerability from nvd – Published: 2018-07-09 17:00 – Updated: 2024-08-05 06:17
VLAI?
Summary
Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:17:15.872Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-06-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-09T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6832",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html",
"refsource": "CONFIRM",
"url": "https://www.foscam.com/company/securing-your-foscam-camera-important-notice.html"
},
{
"name": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/",
"refsource": "MISC",
"url": "https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-6832",
"datePublished": "2018-07-09T17:00:00",
"dateReserved": "2018-02-07T00:00:00",
"dateUpdated": "2024-08-05T06:17:15.872Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}