An issue was discovered on EDIMAX IC-3140W through 3.06, IC-5150W through 3.09, and IC-6220DC through 3.06 devices. The ipcam_cgi binary contains a stack-based buffer overflow that is possible to trigger from a remote unauthenticated /camera-cgi/public/getsysyeminfo.cgi?action=VALUE_HERE HTTP request: if the VALUE_HERE length is more than 0x400 (1024), it is possible to overwrite other values located on the stack due to an incorrect use of the strcpy() function.
References
Link | Resource |
---|---|
https://www.nemux.org/2018/04/24/cve-2018-8072/ | Patch Third Party Advisory |
https://www.edimax.com/edimax/download/download/data/edimax/uk/download/for_home/home_network_cameras/home_network_cameras_indoor_fixed/ic-3140w | Patch Product Vendor Advisory |
https://gitlab.com/nemux/CVE-2018-8072/blob/master/nemux_codemotion_Rome18_cover.pdf | Exploit Technical Description Third Party Advisory |
https://gitlab.com/nemux/CVE-2018-8072/blob/master/CVE-2018-8072_PoC.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2018-04-26 08:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-8072
Mitre link : CVE-2018-8072
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
edimax
- ic-6220dc_firmware
- ic-5150w
- ic-5150w_firmware
- ic-3140w_firmware
- ic-3140w
- ic-6220dc