Intrusion Prevention



This indicates an attack attempt against a Directory Traversal vulnerability in Airlive Ip Camera.
This is possible because the user input filters fail to properly sanitize the READ.filePath parameter that is passed to "/cgi-bin/admin/fileread". It allows a remote attacker to read arbitrary files on vulnerable systems via a crafted http request.

Affected Products

AirLive WL2600CAM


Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

Recommended Actions

Currently we are unaware of any vendor supplied patch for this issue.

CVE References