Vulnerability Description
Vivotek FD8136 devices allow remote memory corruption and remote code execution because of a stack-based buffer overflow, related to sprintf, vlocal_buff_4326, and set_getparam.cgi. NOTE: The vendor has disputed this as a vulnerability and states that the issue does not cause a web server crash or have any other affect on it's performance
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vivotek | Fd8136 Firmware | 0301a |
| Vivotek | Fd8136 | - |
Related Weaknesses (CWE)
References
- https://www.vdalabs.com/2018/07/23/professional-iot-hacking-series-target-selectExploitThird Party Advisory
- https://www.vdalabs.com/2018/11/29/professional-iot-hacking-series-hunting-remotExploitThird Party Advisory
- https://www.vdalabs.com/2018/07/23/professional-iot-hacking-series-target-selectExploitThird Party Advisory
- https://www.vdalabs.com/2018/11/29/professional-iot-hacking-series-hunting-remotExploitThird Party Advisory
FAQ
What is CVE-2018-14496?
CVE-2018-14496 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Vivotek FD8136 devices allow remote memory corruption and remote code execution because of a stack-based buffer overflow, related to sprintf, vlocal_buff_4326, and set_getparam.cgi. NOTE: The vendor h...
How severe is CVE-2018-14496?
CVE-2018-14496 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-14496?
Check the references section above for vendor advisories and patch information. Affected products include: Vivotek Fd8136 Firmware, Vivotek Fd8136.