CVE-2024-7616
📋 TL;DR
A critical command injection vulnerability in Edimax IP cameras allows attackers to execute arbitrary commands on affected devices by manipulating the 'host' parameter in the cgiFormString function. This affects Edimax IC-6220DC and IC-5150W IP cameras up to version 3.06. The vendor has not responded to disclosure attempts.
💻 Affected Systems
- Edimax IC-6220DC
- Edimax IC-5150W
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise allowing attacker to install persistent backdoors, pivot to internal networks, or use device as botnet node.
Likely Case
Remote code execution leading to camera control takeover, credential theft, or denial of service.
If Mitigated
Limited impact if devices are isolated in separate VLANs with strict network controls.
🎯 Exploit Status
Detailed technical analysis available in public references. Exploitation requires sending crafted HTTP requests to the vulnerable CGI endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Monitor Edimax website for firmware updates. Consider replacing devices if no patch is forthcoming.
🔧 Temporary Workarounds
Network Segmentation
allIsolate IP cameras in separate VLAN with strict firewall rules
Web Interface Restriction
linuxBlock external access to camera web interface using firewall rules
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Remove devices from internet-facing networks immediately
- Implement strict network access controls allowing only necessary traffic
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface at System > Firmware. If version is 3.06 or lower, device is vulnerable.
Check Version:
curl -s http://camera-ip/cgi-bin/ipcam_cgi | grep -i version
Verify Fix Applied:
No fix available to verify. Monitor vendor for firmware updates above version 3.06.
📡 Detection & Monitoring
Log Indicators:
- Unusual CGI requests to ipcam_cgi with shell metacharacters
- Unexpected command execution in system logs
Network Indicators:
- HTTP POST requests to /cgi-bin/ipcam_cgi with shell commands in parameters
- Outbound connections from cameras to unusual destinations
SIEM Query:
source="camera_logs" AND (uri="/cgi-bin/ipcam_cgi" AND (param="host" AND value MATCHES "[;&|`$()]"))
🔗 References
- https://vuldb.com/?ctiid.273986
- https://vuldb.com/?id.273986
- https://vuldb.com/?submit.383845
- https://yjz233.notion.site/edimax-IC-5150W-has-command-injection-vulnerability-in-ipcam_cgi-cc72c7b7e2f24ba6a6609b6fcf78df34
- https://yjz233.notion.site/edimax-IC-6220DC-has-command-injection-vulnerability-in-ipcam_cgi-2029d67721f2473b8cfce5e286a70307?pvs=4