CVE-2023-34551
Summary
| CVE | CVE-2023-34551 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-01 18:15:00 UTC |
| Updated | 2023-08-07 19:19:00 UTC |
| Description | In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. The impact is: execute arbitrary code (remote). |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Ezviz | Cs-c6n-a0-1c2wfr-mul | - | All | All | All |
| Operating System | Ezviz | Cs-c6n-a0-1c2wfr-mul Firmware | All | All | All | All |
| Hardware | Ezviz | Cs-c6n-b0-1g2wf | - | All | All | All |
| Operating System | Ezviz | Cs-c6n-b0-1g2wf Firmware | All | All | All | All |
| Hardware | Ezviz | Cs-c6n-r101-1g2wf | - | All | All | All |
| Operating System | Ezviz | Cs-c6n-r101-1g2wf Firmware | All | All | All | All |
| Hardware | Ezviz | Cs-cv248-a0-32wmfr | - | All | All | All |
| Operating System | Ezviz | Cs-cv248-a0-32wmfr Firmware | All | All | All | All |
| Hardware | Ezviz | Cs-cv310-a0-1b2wfr | - | All | All | All |
| Operating System | Ezviz | Cs-cv310-a0-1b2wfr Firmware | All | All | All | All |
| Hardware | Ezviz | Cs-cv310-a0-1c2wfr | - | All | All | All |
| Hardware | Ezviz | Cs-cv310-a0-1c2wfr-c | - | All | All | All |
| Operating System | Ezviz | Cs-cv310-a0-1c2wfr-c Firmware | All | All | All | All |
| Operating System | Ezviz | Cs-cv310-a0-1c2wfr Firmware | All | All | All | All |
| Hardware | Ezviz | Cs-cv310-a0-3c2wfrl-1080p | - | All | All | All |
| Operating System | Ezviz | Cs-cv310-a0-3c2wfrl-1080p Firmware | All | All | All | All |
| Hardware | Ezviz | Lc1c | - | All | All | All |
| Operating System | Ezviz | Lc1c Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| EZVIZ - Creating Easy Smart Homes | MISC | www.ezviz.com | |
| EZVIZ - Creating Easy Smart Homes | MISC | ezviz.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.