Wanscam aj-c0wa-c0d8 firmware
It can be \nused to execute the RCE as root. \n \nMy tests have shown that the InfoLeak affecting the GoAhead server \nrunning on the camera affects at least 1250+ camera models. Misc - \"Cloud\" (Aka Botnet) \n \n \nThe vulnerabilities in the Cloud management affect a lot of P2P or \n\"Cloud\" cameras. Misc - Streaming without authentication \n7. Pre-Auth Info Leak (credentials) within the GoAhead http server \n4. \n \n \nThe summary of the vulnerabilities is: \n \n1.
#Wanscam aj c0wa c0d8 firmware code#
\n \n \nBecause of code reusing, the vulnerabilities are present in a huge \nlist of cameras (especially the InfoLeak and the RCE), \nwhich allow to execute root commands against 1250+ camera models with \na pre-auth vulnerability. The HTTP \ninterface is different for each vendor but shares the same vulnerabilities. \n \nSo, cameras are sold under different names, brands and functions. Wireless IP Camera (P2) WIFICAM is one of the \nbranded cameras.
#Wanscam aj c0wa c0d8 firmware software#
\n \nIt seems that a generic camera is being sold by a Chinese company in \nbulk (OEM) and \nthe buyer companies resell them with custom software development and \nspecific branding. \nThis camera is very similar to a lot of other Chinese cameras. \n \n \n \n \n \n \n# Vulnerabilities Summary \n \nThe Wireless IP Camera (P2) WIFICAM is a camera overall badly designed \nwith a lot of vulnerabilities. , "sourceHref": "", "sourceData": "`-BEGIN PGP SIGNED MESSAGE- \nHash: SHA512 \n \n \n# Advisory Information \n \nTitle: Multiple vulnerabilities found in Wireless IP Camera (P2P) \nWIFICAM cameras and vulnerabilities in GoAhead \nAdvisory URL: \nBlog URL: \nDate published: \nVendors contacted: None \nRelease mode: Released \nCVE: no current CVE \n \n \n \n# Product Description \n \nThe Wireless IP Camera (P2P) WIFICAM is a Chinese web camera which \nallows to stream remotely.