An authenticated attacker can trigger a stack based buffer overflow in the DHIP Service (TCP port 80). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 03 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lorextechnology
Lorextechnology w461asc-e Firmware |
|
CPEs | cpe:2.3:o:lorextechnology:w461asc-e_firmware:-:*:*:*:*:*:*:* | |
Vendors & Products |
Lorextechnology
Lorextechnology w461asc-e Firmware |
|
Metrics |
ssvc
|
Tue, 03 Dec 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authenticated attacker can trigger a stack based buffer overflow in the DHIP Service (TCP port 80). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111. | |
Title | Lorex 2K Indoor Wi-Fi Security Camera - Stack buffer overflow | |
Weaknesses | CWE-787 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: rapid7
Published: 2024-12-03T17:25:31.962Z
Updated: 2024-12-03T21:03:33.398Z
Reserved: 2024-11-12T13:42:42.324Z
Link: CVE-2024-52547
Vulnrichment
Updated: 2024-12-03T18:38:55.721Z
NVD
Status : Received
Published: 2024-12-03T18:15:15.860
Modified: 2024-12-03T21:15:07.707
Link: CVE-2024-52547
Redhat
No data.