1 results (0.002 seconds)

CVSS: 7.5EPSS: 36%CPEs: 2EXPL: 4

Stack-based buffer overflow in UltraCamLib in the UltraCam ActiveX Control (UltraCamX.ocx) for the TRENDnet SecurView camera TV-IP422WN allows remote attackers to execute arbitrary code via a long string to the (1) CGI_ParamSet, (2) OpenFileDlg, (3) SnapFileName, (4) Password, (5) SetCGIAPNAME, (6) AccountCode, or (7) RemoteHost function. Desbordamiento de buffer basado en pila en UltraCamLib en el control de ActiveX UltraCam (UltraCamX.ocx) para el camera Securview TRENDnet TV-IP422WN permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga en la función (1) CGI_ParamSet, (2) OpenFileDlg, (3) SnapFileName, (4) Password, (5) SetCGIAPNAME, (6) AccountCode, o (7) RemoteHost. • https://www.exploit-db.com/exploits/35363 http://packetstormsecurity.com/files/129262/TRENDnet-SecurView-Wireless-Network-Camera-TV-IP422WN-Buffer-Overflow.html http://www.securityfocus.com/bid/71292 http://www.zeroscience.mk/codes/trendnet_bof.txt http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5211.php https://exchange.xforce.ibmcloud.com/vulnerabilities/98948 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •