On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
                
            References
                    | Link | Resource | 
|---|---|
| http://seclists.org/fulldisclosure/2017/Mar/23 | Exploit Mailing List Third Party Advisory | 
| https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead | Exploit Third Party Advisory | 
| http://seclists.org/fulldisclosure/2017/Mar/23 | Exploit Mailing List Third Party Advisory | 
| https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 03:33
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://seclists.org/fulldisclosure/2017/Mar/23 - Exploit, Mailing List, Third Party Advisory | |
| References | () https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead - Exploit, Third Party Advisory | 
Information
                Published : 2017-04-25 20:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-8225
Mitre link : CVE-2017-8225
CVE.ORG link : CVE-2017-8225
JSON object : View
Products Affected
                wificam
- wireless_ip_camera_\(p2p\)
- wireless_ip_camera_\(p2p\)_firmware
CWE
                
                    
                        
                        CWE-522
                        
            Insufficiently Protected Credentials
