Summary
This host is running MayGion IP Camera and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to gain access to information or cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
Impact Level: System/Application
Solution
Upgrade to H.264 ipcam firmware 2013.04.22 or later, For updates refer to http://www.maygion.com
Insight
- The flaw is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../).
- User-supplied input is not properly validated when handling a specially crafted GET request. This may allow a remote attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
Affected
MayGion IP cameras firmware version 2011.27.09
Detection
Send a crafted exploit string via HTTP GET request and check whether it is able to read the sensitive information or not.
References
Severity
Classification
-
CVE CVE-2013-1604, CVE-2013-1605 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities