Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20, after 2018-08-09 through 2020), as used by many different vendors in millions of Internet of Things devices, suffers from buffer overflow vulnerability that allows unauthenticated remote attackers to execute arbitrary code via the peer-to-peer (P2P) service. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
                
            References
                    | Link | Resource | 
|---|---|
| https://hacked.camera/ | Not Applicable | 
| https://redprocyon.com | Not Applicable | 
| https://hacked.camera/ | Not Applicable | 
| https://redprocyon.com | Not Applicable | 
Configurations
                    History
                    No history.
Information
                Published : 2020-08-10 16:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9527
Mitre link : CVE-2020-9527
CVE.ORG link : CVE-2020-9527
JSON object : View
Products Affected
                hichip
- shenzhen_hichip_vision_technology_firmware
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
