CVE-2017-5674

CVE-2017-5674

A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1nn" – note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password.

Source: CVE-2017-5674

CVE-2017-5675

CVE-2017-5675

A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges.

Source: CVE-2017-5675

CVE-2017-6444 (router_hap_lite_firmware)

CVE-2017-6444 (router_hap_lite_firmware)

The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.

Source: CVE-2017-6444 (router_hap_lite_firmware)