CVE-2017-8223

HIGH EXPLOITED IN THE WILD

Wificam Wireless IP Camera (p2p) Firmware - Authentication Bypass

Title source: rule
STIX 2.1

Description

On Wireless IP Camera (P2P) WIFICAM devices, an attacker can use the RTSP server on port 10554/tcp to watch the streaming without authentication via tcp/av0_1 or tcp/av0_0.

Exploits (1)

exploitdb WORKING POC
cremotehardware
https://www.exploit-db.com/exploits/43142

References (2)

Core 2
Core References
Exploit, Mailing List, Third Party Advisory x_refsource_misc
http://seclists.org/fulldisclosure/2017/Mar/23

Scores

CVSS v3 7.5
EPSS 0.1804
EPSS Percentile 95.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2020-12-01
InTheWild.io 2017-03-08
CWE
CWE-287
Status published
Products (1)
wificam/wireless_ip_camera_\(p2p\)_firmware
Published Apr 25, 2017
Tracked Since Feb 18, 2026