cve/2021/CVE-2021-33549.md
2025-09-29 21:09:30 +02:00

37 lines
2.6 KiB
Markdown

### [CVE-2021-33549](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33549)
![](https://img.shields.io/static/v1?label=Product&message=E2%20Series&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Encoder%20G-Code&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%20Stack-based%20Buffer%20Overflow&color=brightgreen)
### Description
Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the action parameter, which may allow an attacker to remotely execute arbitrary code.
### POC
#### Reference
- http://packetstormsecurity.com/files/164191/Geutebruck-instantrec-Remote-Command-Execution.html
- https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
#### Github
- https://github.com/ARPSyndicate/cvemon