TRENDnet ProView Wireless camera TV-IP512WN 1.0R 1.0.4 is vulnerable to an unauthenticated stack-based buffer overflow in handling RTSP packets. This may result in remote code execution or denial of service. The issue is in the binary rtspd (in /sbin) when parsing a long "Authorization: Basic" RTSP header.
References
Link | Resource |
---|---|
https://payatu.com/blog/munawwar/trendNet-wireless-camera-buffer-overflow-vulnerability | Exploit Third Party Advisory |
https://payatu.com/blog/munawwar/trendNet-wireless-camera-buffer-overflow-vulnerability | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://payatu.com/blog/munawwar/trendNet-wireless-camera-buffer-overflow-vulnerability - Exploit, Third Party Advisory |
Information
Published : 2020-05-13 15:15
Updated : 2024-11-21 05:00
NVD link : CVE-2020-12763
Mitre link : CVE-2020-12763
CVE.ORG link : CVE-2020-12763
JSON object : View
Products Affected
trendnet
- tv-ip512wn_firmware
- tv-ip512wn
CWE
CWE-787
Out-of-bounds Write