Description
In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. The impact is: execute arbitrary code (remote).
Published: 2023-08-01
Score: 8.0 High
EPSS: 2.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-38606 In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. The impact is: execute arbitrary code (remote).
History

Mon, 21 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:ezviz:cs-c6n-a0-1c2wfr-mul_firmware:5.3.2:build230218:*:*:*:*:*:*
cpe:2.3:o:ezviz:cs-c6n-b0-1g2wf_firmware:5.3.0:build210731:*:*:*:*:*:*
cpe:2.3:o:ezviz:cs-c6n-r101-1g2wf_firmware:5.3.0:build230215:*:*:*:*:*:*
cpe:2.3:o:ezviz:cs-cv248-a0-32wmfr_firmware:5.2.3:build230217:*:*:*:*:*:*
cpe:2.3:o:ezviz:cs-cv310-a0-1b2wfr_firmware:5.3.0:build230221:*:*:*:*:*:*
cpe:2.3:o:ezviz:cs-cv310-a0-1c2wfr-c_firmware:5.3.2:build230221:*:*:*:*:*:*
cpe:2.3:o:ezviz:cs-cv310-a0-3c2wfrl-1080p_firmware:5.2.7:build230302:*:*:*:*:*:*
cpe:2.3:o:ezviz:lc1c_firmware:5.3.4:build230214:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Ezviz Cs-c6n-a0-1c2wfr-mul Cs-c6n-a0-1c2wfr-mul Firmware Cs-c6n-b0-1g2wf Cs-c6n-b0-1g2wf Firmware Cs-c6n-r101-1g2wf Cs-c6n-r101-1g2wf Firmware Cs-cv248-a0-32wmfr Cs-cv248-a0-32wmfr Firmware Cs-cv310-a0-1b2wfr Cs-cv310-a0-1b2wfr Firmware Cs-cv310-a0-1c2wfr Cs-cv310-a0-1c2wfr-c Cs-cv310-a0-1c2wfr-c Firmware Cs-cv310-a0-1c2wfr Firmware Cs-cv310-a0-3c2wfrl-1080p Cs-cv310-a0-3c2wfrl-1080p Firmware Lc1c Lc1c Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-21T18:29:21.891Z

Reserved: 2023-06-07T00:00:00.000Z

Link: CVE-2023-34551

cve-icon Vulnrichment

Updated: 2024-08-02T16:10:07.133Z

cve-icon NVD

Status : Modified

Published: 2023-08-01T18:15:09.997

Modified: 2024-11-21T08:07:22.150

Link: CVE-2023-34551

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses