Intrusion Prevention

Airlive.IP.Camera.READ.filePath.Directory.Traversal

Description

This indicates an attack attempt against a Directory Traversal vulnerability in Airlive Ip Camera.
This is possible because the user input filters fail to properly sanitize the READ.filePath parameter that is passed to "/cgi-bin/admin/fileread". It allows a remote attacker to read arbitrary files on vulnerable systems via a crafted http request.

Affected Products

AirLive WL2600CAM

Impact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

Recommended Actions

Currently we are unaware of any vendor supplied patch for this issue.

CVE References

CVE-2013-3541