{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-9833","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-05T17:18:02.190Z","dateReserved":"2017-06-23T00:00:00.000Z","datePublished":"2017-06-24T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2022-12-07T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"/cgi-bin/wapopen in Boa 0.94.14rc21 allows the injection of \"../..\" using the FILECAMERA variable (sent by GET) to read files with root privileges. NOTE: multiple third parties report that this is a system-integrator issue (e.g., a vulnerability on one type of camera) because Boa does not include any wapopen program or any code to read a FILECAMERA variable."}],"tags":["disputed"],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://pastebin.com/raw/rt7LJvyF"},{"name":"42290","tags":["exploit"],"url":"https://www.exploit-db.com/exploits/42290/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"datePublic":"2017-06-23T00:00:00.000Z"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T17:18:02.190Z"},"title":"CVE Program Container","references":[{"url":"https://pastebin.com/raw/rt7LJvyF","tags":["x_transferred"]},{"name":"42290","tags":["exploit","x_transferred"],"url":"https://www.exploit-db.com/exploits/42290/"}]}]}}