Description
A buffer overflow vulnerability in the dgiot binary in LSC Smart Indoor IP Camera V7.6.32. The flaw exists in the handling of the Time Zone (TZ) parameter within the ONVIF configuration interface. The time zone (TZ) parameter does not have its length properly validated before being copied into a fixed-size buffer using the insecure strcpy function.
Published: 2026-03-25
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the dgiot binary of the LSC Smart Indoor IP Camera firmware. The flaw appears when the Time Zone (TZ) parameter from the ONVIF configuration interface is processed. Because the length of this string is not validated before copying into a fixed‑size buffer with an insecure strcpy call, a crafted TZ value can overwrite adjacent memory. This uncontrolled write is a classic CWE‑120 condition that could allow an attacker to alter program flow and execute arbitrary code, thereby compromising the confidentiality, integrity, and availability of the camera system.

Affected Systems

The only vendor and product explicitly mentioned is the LSC Smart Indoor IP Camera running firmware version 7.6.32. No other Siemens or third‑party devices are noted, and no later firmware revisions are listed as covered by this advisory.

Risk and Exploitability

The CVSS base score of 7.2 indicates high severity. EPSS information is not available, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that the attack vector is remote over the network, likely targeting the ONVIF management endpoint. An attacker with network reach could send a malicious TZ value in an HTTP request to trigger the overflow. While no wild‑field exploitation has been documented, the vulnerability is theoretically exploitable with modest effort and is the type that can be chained with other camera‑specific weaknesses.

Generated by OpenCVE AI on March 25, 2026 at 20:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a firmware update that fixes the ONVIF TZ handling bug, if one is released by the vendor.
  • If an update is unavailable, restrict access to the ONVIF configuration service using firewall rules or network segmentation.
  • Disable the ONVIF configuration service altogether if remote configuration is not required.
  • Verify the firmware version on each camera and monitor vendor advisories for future patches.

Generated by OpenCVE AI on March 25, 2026 at 20:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Lsc
Lsc smart Connect Indoor Ip Camera
Vendors & Products Lsc
Lsc smart Connect Indoor Ip Camera

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in LSC Smart Indoor IP Camera ONVIF Time Zone Configuration

Wed, 25 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability in the dgiot binary in LSC Smart Indoor IP Camera V7.6.32. The flaw exists in the handling of the Time Zone (TZ) parameter within the ONVIF configuration interface. The time zone (TZ) parameter does not have its length properly validated before being copied into a fixed-size buffer using the insecure strcpy function.
References

Subscriptions

Lsc Smart Connect Indoor Ip Camera
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-25T17:41:23.339Z

Reserved: 2024-10-28T00:00:00.000Z

Link: CVE-2024-51347

cve-icon Vulnrichment

Updated: 2026-03-25T17:41:12.833Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T14:16:29.097

Modified: 2026-03-25T18:16:24.673

Link: CVE-2024-51347

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T11:51:37Z

Weaknesses