TROYANOSYVIRUS
Back to CVEs

CVE-2023-34551

HIGH
8.0

Description

In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. The impact is: execute arbitrary code (remote).

CVE Details

CVSS v3.1 Score8.0
SeverityHIGH
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published8/1/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

ezviz:cs-c6n-a0-1c2wfr-mulezviz:cs-c6n-a0-1c2wfr-mul_firmwareezviz:cs-c6n-b0-1g2wfezviz:cs-c6n-b0-1g2wf_firmwareezviz:cs-c6n-r101-1g2wfezviz:cs-c6n-r101-1g2wf_firmwareezviz:cs-cv248-a0-32wmfrezviz:cs-cv248-a0-32wmfr_firmwareezviz:cs-cv310-a0-1b2wfrezviz:cs-cv310-a0-1b2wfr_firmwareezviz:cs-cv310-a0-1c2wfrezviz:cs-cv310-a0-1c2wfr-cezviz:cs-cv310-a0-1c2wfr-c_firmwareezviz:cs-cv310-a0-1c2wfr_firmwareezviz:cs-cv310-a0-3c2wfrl-1080pezviz:cs-cv310-a0-3c2wfrl-1080p_firmwareezviz:lc1cezviz:lc1c_firmware

Weaknesses (CWE)

CWE-787

References

http://ezviz.com(cve@mitre.org)
http://ezviz.com(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.