Unauthorized Remote Code Execution in EZVIZ Network Cameras Due to Stack-Based Buffer Overflows
CVE-2023-34552

8.8HIGH

Key Information:

Vendor

Ezviz

Vendor
CVE Published:
1 August 2023

What is CVE-2023-34552?

EZVIZ products are susceptible to security issues due to stack-based buffer overflows found in the multicast_parse_sadp_packet and multicast_get_pack_type functions within the SADP multicast protocol. These vulnerabilities enable an unauthenticated attacker situated on the same local network to execute arbitrary code remotely. This compromises the security of several firmware versions across multiple devices. Immediate updates and security patches are essential to safeguard these network cameras against potential exploitation.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.