- Description
- Wyze Cam v3 Realtek Wi-Fi Driver Heap-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Wyze Cam v3 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Realtek Wi-Fi kernel module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the kernel. Was ZDI-CAN-22310.
- Source
- zdi-disclosures@trendmicro.com
- NVD status
- Received
CVSS 3.0
- Type
- Secondary
- Base score
- 9.6
- Impact score
- 6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- zdi-disclosures@trendmicro.com
- CWE-122
- Hype score
- Not currently trending
[CVE-2024-6246: CRITICAL] Critical vulnerability in Wyze Cam v3 Realtek Wi-Fi driver allows remote code execution without authentication. Attackers exploit buffer overflow flaw to run arbitrary code. Fix recommend...#cybersecurity,#vulnerability https://t.co/sSPea8rYwH https://t.
@CveFindCom
22 Nov 2024
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-6246 Wyze Cam v3 Realtek Wi-Fi Driver Heap-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitra… https://t.co/svyYsA4UZY
@CVEnew
22 Nov 2024
199 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes