Medium severity6.5NVD Advisory· Published Jun 21, 2017· Updated May 13, 2026
CVE-2017-2829
CVE-2017-2829
Description
An exploitable directory traversal vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause the application to read a file from disk but a failure to adequately filter characters results in allowing an attacker to specify a file outside of a directory. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
Affected products
2- cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*
- Foscam/Indoor IP Camera C1 Seriesv5Range: n/a
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.talosintelligence.com/vulnerability_reports/TALOS-2017-0330nvdExploitThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/99250nvdBroken Link
News mentions
0No linked articles in our index yet.