Airlive.IP.Camera.READ.filePath.Directory.Traversal
Description
This indicates an attack attempt against a Directory Traversal vulnerability in Airlive Ip Camera.
This is possible because the user input filters fail to properly sanitize the READ.filePath parameter that is passed to "/cgi-bin/admin/fileread". It allows a remote attacker to read arbitrary files on vulnerable systems via a crafted http request.
Affected Products
AirLive WL2600CAM
Impact
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Recommended Actions
Currently we are unaware of any vendor supplied patch for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |