Vulnerability Description
In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. The impact is: execute arbitrary code (remote).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ezviz | Cs-C6N-B0-1G2Wf Firmware | <= 5.3.0 |
| Ezviz | Cs-C6N-B0-1G2Wf | - |
| Ezviz | Cs-C6N-R101-1G2Wf Firmware | <= 5.3.0 |
| Ezviz | Cs-C6N-R101-1G2Wf | - |
| Ezviz | Cs-Cv310-A0-1B2Wfr Firmware | <= 5.3.0 |
| Ezviz | Cs-Cv310-A0-1B2Wfr | - |
| Ezviz | Cs-Cv310-A0-1C2Wfr-C Firmware | <= 5.3.2 |
| Ezviz | Cs-Cv310-A0-1C2Wfr-C | - |
| Ezviz | Cs-C6N-A0-1C2Wfr-Mul Firmware | <= 5.3.2 |
| Ezviz | Cs-C6N-A0-1C2Wfr-Mul | - |
| Ezviz | Cs-Cv310-A0-3C2Wfrl-1080P Firmware | <= 5.2.7 |
| Ezviz | Cs-Cv310-A0-3C2Wfrl-1080P | - |
| Ezviz | Cs-Cv310-A0-1C2Wfr Firmware | <= 5.3.2 |
| Ezviz | Cs-Cv310-A0-1C2Wfr | - |
| Ezviz | Cs-Cv248-A0-32Wmfr Firmware | <= 5.2.3 |
| Ezviz | Cs-Cv248-A0-32Wmfr | - |
| Ezviz | Lc1C Firmware | <= 5.3.4 |
| Ezviz | Lc1C | - |
Related Weaknesses (CWE)
References
- http://ezviz.comProduct
- https://www.ezviz.com/data-security/security-notice/detail/827Vendor Advisory
- http://ezviz.comProduct
- https://www.ezviz.com/data-security/security-notice/detail/827Vendor Advisory
FAQ
What is CVE-2023-34551?
CVE-2023-34551 is a vulnerability with a CVSS score of 8.0 (HIGH). In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camer...
How severe is CVE-2023-34551?
CVE-2023-34551 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-34551?
Check the references section above for vendor advisories and patch information. Affected products include: Ezviz Cs-C6N-B0-1G2Wf Firmware, Ezviz Cs-C6N-B0-1G2Wf, Ezviz Cs-C6N-R101-1G2Wf Firmware, Ezviz Cs-C6N-R101-1G2Wf, Ezviz Cs-Cv310-A0-1B2Wfr Firmware.