2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-25784" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2021-01-28T03:15:12.243" ,
"lastModified" : "2021-02-01T20:36:44.510" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CNetClientGuard::SubOprMsg during incoming message handling."
} ,
{
"lang" : "es" ,
"value" : "Se detect\u00f3 un problema en Accfly Wireless Security IR Camera System 720P con versiones de software v3.10.73 hasta v4.15.77. Se presenta un desbordamiento del b\u00fafer no autenticado en la regi\u00f3n stack de la memoria en la funci\u00f3n CNetClientGuard::SubOprMsg durante el manejo de mensajes entrantes"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 7.5
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:accfly:720p_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.10.73" ,
"versionEndIncluding" : "4.15.77" ,
"matchCriteriaId" : "291851F2-BE77-4BF0-B0A1-35F0C8F7ED2F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:accfly:720p:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "034B4BA6-0116-4D3F-8853-BEA4774AABEA"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/tezeb/accfly/blob/master/Readme.md" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Technical Description" ,
"Third Party Advisory"
]
}
]
}