D-Link DCS-8300LHV2 RTSP ValidateAuthorizationHeader Username Stack-Based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-51626

8.8HIGH

Key Information:

Vendor
D-Link
Vendor
CVE Published:
3 May 2024

Summary

A stack-based buffer overflow vulnerability in D-Link's DCS-8300LHV2 IP cameras arises from inadequate validation of user-supplied data length in the Authorization header by the RTSP server. Attackers on the same network can exploit this flaw, allowing unauthorized execution of arbitrary code with root privileges. The issue presents a significant security risk as it does not require authentication, making it accessible to potential intruders. The RTSP server listens on TCP port 554, further facilitating the exploit for savvy attackers.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.