Airlive.IP.Camera.READ.filePath.Directory.Traversal

description-logoDescription

This indicates an attack attempt against a Directory Traversal vulnerability in Airlive Ip Camera.
This is possible because the user input filters fail to properly sanitize the READ.filePath parameter that is passed to "/cgi-bin/admin/fileread". It allows a remote attacker to read arbitrary files on vulnerable systems via a crafted http request.

affected-products-logoAffected Products

AirLive WL2600CAM

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are unaware of any vendor supplied patch for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)