Impact
A stack-based buffer overflow occurs in the P2P API service of BS Producten Petcam. The flaw allows an unauthenticated attacker within local network range to send a specially crafted HTTP request, overwrite the instruction pointer, and execute arbitrary code on the device.
Affected Systems
The vulnerability affects BS Producten Petcam devices running firmware 33.1.0.0818. No other firmware versions or products are listed as affected.
Risk and Exploitability
The problem has a CVSS score of 8.8, indicating high severity. No EPSS score is available, and the issue is not listed in the CISA KEV catalog, suggesting it may not yet be widely exploited. Exploitation requires only local network access and no authentication, making the attack vector easy for an attacker who can reach the device on the network. The stack overflow leads to full remote code execution, granting the attacker complete control over the device.
OpenCVE Enrichment