Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
In certain EZVIZ products, two stack based buffer overflows in mulicast_parse_sadp_packet and mulicast_get_pack_type functions of the SADP multicast protocol can allow an unauthenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
EZVIZ CS Series 缓冲区错误漏洞
Vulnerability Description
EZVIZ CS Series是中国萤石(EZVIZ)公司的一系列摄像头。 EZVIZ CS Series 存在安全漏洞,该漏洞源于SADP 组播协议的 mulicast_parse_sadp_packet 和 mulicast_get_pack_type 函数中包含两个基于堆栈的缓冲区溢出,允许与摄像机位于同一本地网络上的经过身份验证的攻击者实现远程代码执行,以下产品和版本受到影响:CS-C6N-B0-1G2WF V5.3.0(build 230215)之前版本、CS-C6N-R101-1G2WF V5
CVSS Information
N/A
Vulnerability Type
N/A