{ "schema_version": "1.4.0", "id": "GHSA-7xq2-c45q-mc68", "modified": "2025-04-20T03:34:01Z", "published": "2022-05-17T02:55:24Z", "aliases": [ "CVE-2017-5674" ], "details": "A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP (\"GET system.ini HTTP/1.1\\n\\n\" - note the lack of \"/\" in the path field of the request) request that will disclose the configuration file with the login password.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5674" }, { "type": "WEB", "url": "https://www.cybereason.com/cve-ip-cameras" }, { "type": "WEB", "url": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves" } ], "database_specific": { "cwe_ids": [ "CWE-200" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-03-13T06:59:00Z" } }