CVE-2023-34551

moderate-risk
Published 2023-08-01

In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. The impact is: execute arbitrary code (remote).

Do I need to act?

~
3.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.0/10 High
ADJACENT_NETWORK / LOW complexity

Affected Products (9)

Cs-C6N-B0-1G2Wf Firmware
Cs-C6N-R101-1G2Wf Firmware
Cs-Cv310-A0-1B2Wfr Firmware
Cs-Cv310-A0-1C2Wfr-C Firmware
Cs-C6N-A0-1C2Wfr-Mul Firmware
Cs-Cv310-A0-3C2Wfrl-1080P Firmware
Cs-Cv310-A0-1C2Wfr Firmware
Cs-Cv248-A0-32Wmfr Firmware
Lc1C Firmware

Affected Vendors

46
/ 100
moderate-risk
Severity 25/34 · High
Exploitability 6/34 · Minimal
Exposure 15/34 · Moderate