CVE-2017-8223
HIGH EXPLOITED IN THE WILDWificam Wireless IP Camera (p2p) Firmware - Authentication Bypass
Title source: ruleDescription
On Wireless IP Camera (P2P) WIFICAM devices, an attacker can use the RTSP server on port 10554/tcp to watch the streaming without authentication via tcp/av0_1 or tcp/av0_0.
Exploits (1)
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead
Exploit, Mailing List, Third Party Advisory x_refsource_misc
http://seclists.org/fulldisclosure/2017/Mar/23
Scores
CVSS v3
7.5
EPSS
0.1804
EPSS Percentile
95.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2020-12-01
InTheWild.io
2017-03-08
CWE
CWE-287
Status
published
Products (1)
wificam/wireless_ip_camera_\(p2p\)_firmware
Published
Apr 25, 2017
Tracked Since
Feb 18, 2026