// For flags

CVE-2012-5306

D-Link DCS-5605 Network Surveillance - ActiveX Control 'DcsCliCtrl.dll' lstrcpyW Remote Buffer Overflow

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Stack-based buffer overflow in the SelectDirectory method in DcsCliCtrl.dll in Camera Stream Client ActiveX Control, as used in D-Link DCS-5605 PTZ IP Network Camera, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string argument.

Desbordamiento de búfer basado en pila en el método SelectDirectory en DcsCliCtrl.dll en el control ActiveX Camera Stream Client, como el usado en D-Link DCS-5605 PTZ IP Network Camera, permite a atacantes remotos ejecutar código a través de de un argumento con una cadena larga.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-03-28 First Exploit
  • 2012-10-06 CVE Reserved
  • 2012-10-06 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-10-25 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dlink
Search vendor "Dlink"
Camera Stream Client Activex Control
Search vendor "Dlink" for product "Camera Stream Client Activex Control"
1.0.0.4519
Search vendor "Dlink" for product "Camera Stream Client Activex Control" and version "1.0.0.4519"
-
Affected
Dlink
Search vendor "Dlink"
Dcs-5605 Ptz Ip Network Camera
Search vendor "Dlink" for product "Dcs-5605 Ptz Ip Network Camera"
--
Affected