Loading
A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password.
Use CWE-200, Embedthis vendor hub and Goahead product page to widen CVE-2017-5674 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2021-41615, CVE-2021-43298 and CVE-2021-42342 for nearby disclosures in the same product family.