CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
A stack-based buffer overflow vulnerability exists in the message parsing functionality of the Roku Indoor Camera SE version 3.0.2.4679 and Wyze Cam v3 version 4.36.11.5859. A specially crafted message can lead to stack-based buffer overflow. An attacker can make authenticated requests to trigger this vulnerability.
[
{
"cpes": [
"cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:*"
],
"vendor": "wyze",
"product": "cam_v3",
"versions": [
{
"status": "affected",
"version": "-"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:h:roku:indoor_camera_se:-:*:*:*:*:*:*:*"
],
"vendor": "roku",
"product": "indoor_camera_se",
"versions": [
{
"status": "affected",
"version": "-"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
SSVC
Exploitation
none
Automatable
no
Technical Impact
total