Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20, after 2018-08-09 through 2020), as used by many different vendors in millions of Internet of Things devices, suffers from buffer overflow vulnerability that allows unauthenticated remote attackers to execute arbitrary code via the peer-to-peer (P2P) service. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
References
Link | Resource |
---|---|
https://hacked.camera/ | Not Applicable |
https://redprocyon.com | Not Applicable |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-08-10T15:24:50
Updated: 2020-08-10T15:24:50
Reserved: 2020-03-01T00:00:00
Link: CVE-2020-9527
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-08-10T16:15:12.300
Modified: 2020-08-18T13:23:30.587
Link: CVE-2020-9527
JSON object: View
Redhat Information
No data.
CWE