A Buffer Overflow vulnerability in the RSTP server component of Eufy Indoor 2K Indoor Camera allows a local attacker to achieve remote code execution. This issue affects: Eufy Indoor 2K Indoor Camera 2.0.9.3 version and prior versions.
References
Link | Resource |
---|---|
https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-eufy2k-indoor-camera/ | Exploit Technical Description Third Party Advisory |
https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-eufy2k-indoor-camera/ | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.4
v3 : 7.6 |
References | () https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-eufy2k-indoor-camera/ - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2022-05-31 10:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3555
Mitre link : CVE-2021-3555
CVE.ORG link : CVE-2021-3555
JSON object : View
Products Affected
eufylife
- solo_indoorcam_p24
- solo_indoorcam_p24_firmware
- solo_indoorcam_c24
- solo_indoorcam_c24_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')