CVE-2017-17105
📋 TL;DR
This vulnerability allows unauthenticated attackers to execute arbitrary commands on affected Zivif web cameras via command injection in CGI scripts. Attackers can remotely compromise the device without credentials, potentially taking full control. Users of Zivif PR115-204-P-RS cameras running vulnerable firmware versions are affected.
💻 Affected Systems
- Zivif PR115-204-P-RS web camera
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to install persistent malware, pivot to internal networks, disable cameras, or use devices in botnets.
Likely Case
Camera reboot or temporary disruption, unauthorized access to video feeds, or device being added to IoT botnets.
If Mitigated
Limited impact if cameras are isolated on separate network segments with strict firewall rules.
🎯 Exploit Status
Simple HTTP request with command injection payload. Multiple public exploit scripts available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Check vendor website for firmware updates. Consider replacing with supported devices.
🔧 Temporary Workarounds
Network Isolation
allPlace cameras on isolated VLAN with no internet access and strict firewall rules.
Disable Web Interface
allTurn off web interface if not required for operation.
🧯 If You Can't Patch
- Block all external access to camera web interface at firewall
- Implement network segmentation to prevent lateral movement from compromised cameras
🔍 How to Verify
Check if Vulnerable:
Test with curl: curl -v 'http://[CAMERA_IP]/cgi-bin/iptest.cgi?cmd=iptest.cgi&-time="1504225666237"&-url=$(reboot)' - check for reboot response
Check Version:
Check firmware version in web interface at http://[CAMERA_IP]/ or via device management interface
Verify Fix Applied:
Test same exploit attempt - should fail or return error instead of executing command
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /cgi-bin/iptest.cgi with unusual parameters
- System reboot logs without authorized cause
- Unusual command execution in system logs
Network Indicators:
- HTTP requests containing $(...) or ; characters in URL parameters
- Traffic to camera web interface from unexpected sources
SIEM Query:
source="web_logs" AND uri_path="/cgi-bin/iptest.cgi" AND (query="*$(*" OR query="*;*")
🔗 References
- http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html
- http://packetstormsecurity.com/files/158120/Zivif-Camera-2.3.4.2103-iptest.cgi-Blind-Remote-Command-Execution.html
- http://seclists.org/fulldisclosure/2017/Dec/42
- https://twitter.com/silascutler/status/938052460328968192
- http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html
- http://packetstormsecurity.com/files/158120/Zivif-Camera-2.3.4.2103-iptest.cgi-Blind-Remote-Command-Execution.html
- http://seclists.org/fulldisclosure/2017/Dec/42
- https://twitter.com/silascutler/status/938052460328968192