This issue was discovered when the ipTIME C200 IP Camera...
Critical severity
Unreviewed
Published
Dec 1, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Nov 30, 2021
Published to the GitHub Advisory Database
Dec 1, 2021
Last updated
Feb 1, 2023
This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
References