Wireless Ip Camera \(p2p\) Firmware
Sign in to watchby Wificam
CVEs (4)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-8225 | Cri | 0.71 | 9.8 | 0.59 | Apr 25, 2017 | On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI. | |
| CVE-2017-8224 | Cri | 0.68 | 9.8 | 0.12 | Apr 25, 2017 | Wireless IP Camera (P2P) WIFICAM devices have a backdoor root account that can be accessed with TELNET. | |
| CVE-2017-8223 | Hig | 0.53 | 7.5 | 0.18 | Apr 25, 2017 | On Wireless IP Camera (P2P) WIFICAM devices, an attacker can use the RTSP server on port 10554/tcp to watch the streaming without authentication via tcp/av0_1 or tcp/av0_0. | |
| CVE-2017-8221 | Hig | 0.53 | 7.5 | 0.19 | Apr 25, 2017 | Wireless IP Camera (P2P) WIFICAM devices rely on a cleartext UDP tunnel protocol (aka the Cloud feature) for communication between an Android application and a camera device, which allows remote attackers to obtain sensitive information by sniffing the network. |