PierreKimSec

5 exploits Active since Mar 2017
CVE-2017-8221 EXPLOITDB HIGH c WORKING POC
Wificam Wireless IP Camera (p2p) Firmware - Missing Encryption
Wireless IP Camera (P2P) WIFICAM devices rely on a cleartext UDP tunnel protocol (aka the Cloud feature) for communication between an Android application and a camera device, which allows remote attackers to obtain sensitive information by sniffing the network.
CVSS 7.5
CVE-2017-8222 EXPLOITDB HIGH c WORKING POC
Wificam Wireless IP Camera (p2p) Firm... - Insufficiently Protected Credentials
Wireless IP Camera (P2P) WIFICAM devices have an "Apple Production IOS Push Services" private RSA key and certificate stored in /system/www/pem/ck.pem inside the firmware, which allows attackers to obtain sensitive information.
CVSS 7.5
CVE-2017-8223 EXPLOITDB HIGH c WORKING POC
Wificam Wireless IP Camera (p2p) Firmware - Authentication Bypass
On Wireless IP Camera (P2P) WIFICAM devices, an attacker can use the RTSP server on port 10554/tcp to watch the streaming without authentication via tcp/av0_1 or tcp/av0_0.
CVSS 7.5
CVE-2017-5850 EXPLOITDB HIGH text WORKING POC
Openbsd - Resource Allocation Without Limits
httpd in OpenBSD allows remote attackers to cause a denial of service (memory consumption) via a series of requests for a large file using an HTTP Range header.
CVSS 7.5
CVE-2017-8225 EXPLOITDB CRITICAL c WORKING POC
Wificam Wireless IP Camera (p2p) Firm... - Insufficiently Protected Credentials
On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
CVSS 9.8