CVE-2014-1849
Foscam IP camera 11.37.2.49 and other versions, when using the Foscam DynDNS option, generates credentials based on predictable camera subdomain names, which allows remote attackers to spoof or hijack arbitrary cameras and conduct other attacks by modifying arbitrary camera records in the Foscam DNS server.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.2113 (21.1%)
Percentile: 95.7%
EPSS: 2026-05-06
Affects
foscam:ip_camera_firmwareTechnical description
Foscam IP camera 11.37.2.49 and other versions, when using the Foscam DynDNS option, generates credentials based on predictable camera subdomain names, which allows remote attackers to spoof or hijack arbitrary cameras and conduct other attacks by modifying arbitrary camera records in the Foscam DNS server.
Published: 5/14/2014, 12:55:08 AM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://blog.shekyan.com/2014/05/cve-2014-1849-foscam-dynamic-dns-predictable-credentials-vulnerability.html
- http://seclists.org/fulldisclosure/2014/May/35
- https://github.com/artemharutyunyan/getmecamtool/blob/master/src/dnsmod.c
- http://blog.shekyan.com/2014/05/cve-2014-1849-foscam-dynamic-dns-predictable-credentials-vulnerability.html
- http://seclists.org/fulldisclosure/2014/May/35
- https://github.com/artemharutyunyan/getmecamtool/blob/master/src/dnsmod.c