Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20, after 2018-08-09 through 2020), as used by many different vendors in millions of Internet of Things devices, suffers from buffer overflow vulnerability that allows unauthenticated remote attackers to execute arbitrary code via the peer-to-peer (P2P) service. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://hacked.camera/ | |
https://redprocyon.com |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2020-08-10T15:24:50
Updated: 2024-08-04T10:34:39.478Z
Reserved: 2020-03-01T00:00:00
Link: CVE-2020-9527
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2020-08-10T16:15:12.300
Modified: 2020-08-18T13:23:30.587
Link: CVE-2020-9527
Redhat
No data.