{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T09:02:10.632","vulnerabilities":[{"cve":{"id":"CVE-2017-2841","sourceIdentifier":"talos-cna@cisco.com","published":"2017-06-27T15:29:00.177","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary data in the \"msmtprc\" configuration file resulting in command execution. An attacker can simply send an HTTP request to the device to trigger this vulnerability."},{"lang":"es","value":"Existe una vulnerabilidad de inyección de comandos en la interfaz de gestión web empleada por Foscam C1 Indoor HD Camera ejecutando el firmware de aplicación 2.52.2.37. Una petición HTTP especialmente manipulada puede permitir que un usuario inyecte datos arbitrarios en el archivo de configuración \"msmtprc\", lo que resulta en una ejecución de comandos. Un atacante puede simplemente enviar una petición HTTP al dispositivo para desencadenar esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*","matchCriteriaId":"0E42CC0A-E8B0-407C-A6B8-079CC10D2271"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*","matchCriteriaId":"24F43869-2168-407A-B546-06998CA5D572"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/99184","source":"talos-cna@cisco.com","tags":["Broken Link"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2017-0343","source":"talos-cna@cisco.com","tags":["Technical Description","Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/99184","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2017-0343","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Technical Description","Third Party Advisory","VDB Entry"]}]}}]}