Stack-based buffer overflow in UltraCamLib in the UltraCam ActiveX Control (UltraCamX.ocx) for the TRENDnet SecurView camera TV-IP422WN allows remote attackers to execute arbitrary code via a long string to the (1) CGI_ParamSet, (2) OpenFileDlg, (3) SnapFileName, (4) Password, (5) SetCGIAPNAME, (6) AccountCode, or (7) RemoteHost function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/129262/TRENDnet-SecurView-Wireless-Network-Camera-TV-IP422WN-Buffer-Overflow.html - | |
References | () http://www.securityfocus.com/bid/71292 - Exploit | |
References | () http://www.zeroscience.mk/codes/trendnet_bof.txt - Exploit | |
References | () http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5211.php - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/98948 - |
Information
Published : 2015-01-13 11:59
Updated : 2024-11-21 02:03
NVD link : CVE-2014-10011
Mitre link : CVE-2014-10011
CVE.ORG link : CVE-2014-10011
JSON object : View
Products Affected
trendnet
- tv-ip422w
- tv-ip422wn
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer