Lucene search

K
SamsungSth-eth-250 Firmware

5 matches found

CVE
CVE
added 2018/08/28 8:29 p.m.57 views

CVE-2018-3916

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 136 bytes. An attacker can s...

7.8CVSS8.3AI score0.00161EPSS
CVE
CVE
added 2018/09/21 3:29 p.m.50 views

CVE-2018-3914

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 2000 bytes. An attacker can ...

7.8CVSS8.3AI score0.00161EPSS
CVE
CVE
added 2018/08/27 3:29 p.m.48 views

CVE-2018-3918

An exploitable vulnerability exists in the remote servers of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process listens on port 39500 and relays any unauthenticated messages to SmartThings' remote servers, which incorrectly handle camera IDs for the 'sync' operation...

7.5CVSS7.6AI score0.00755EPSS
CVE
CVE
added 2018/08/23 6:29 p.m.46 views

CVE-2018-3912

On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process insecurely extracts the fields from the "shard" table of its SQLite database, leading to a buffer overflow on the stack. The strcpy call overflows the destination buffer, which has a size of 128 byt...

7.8CVSS8.3AI score0.00152EPSS
CVE
CVE
added 2018/09/21 3:29 p.m.43 views

CVE-2018-3913

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 32 bytes. An attacker can se...

7.5CVSS7.3AI score0.00053EPSS