Required CVE Record Information
Description
The web interface on (1) Foscam and (2) Wansview IP cameras allows remote attackers to bypass authentication, and perform administrative functions or read the admin password, via a direct request to an unspecified URL.
References 6 Total
- secunia.com: 50966 third-party-advisory
- http://foscam.us/forum/h264-ip-camera-web-interface-authentication-bypass-test-tool-t3252.html
- kb.cert.org: VU#265532 third-party-advisory
- http://www.foscam.com/help.aspx?TypeId=11
- secunia.com: 50950 third-party-advisory
- securityfocus.com: 55873 vdb-entry
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 6 Total
- secunia.com: 50966 third-party-advisoryx_transferred
- http://foscam.us/forum/h264-ip-camera-web-interface-authentication-bypass-test-tool-t3252.html x_transferred
- kb.cert.org: VU#265532 third-party-advisoryx_transferred
- http://www.foscam.com/help.aspx?TypeId=11 x_transferred
- secunia.com: 50950 third-party-advisoryx_transferred
- securityfocus.com: 55873 vdb-entryx_transferred