We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-45225

Zavio IP Camera Stack-Based Buffer Overflow



Assignericscert
Reserved2023-10-10
Published2023-11-08
Updated2024-08-02

Description

Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220, and CD321 IP Cameras  with firmware version M2.1.6.05 are vulnerable to multiple instances of stack-based overflows. While parsing certain XML elements from incoming network requests, the product does not sufficiently check or validate allocated buffer size. This may lead to remote code execution.



CRITICAL: 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Default status
unaffected

version M2.1.6.05
affected

Credits

Attila Szasz finder

References

https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03

cve.org CVE-2023-45225

nvd.nist.gov CVE-2023-45225

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-45225

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.