This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of 3S Pocketnet Tech VMS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the PocketNetNVRMediaClientAxCtrl.NVRMediaViewer.1 control. The StartRecord, StartRecordEx, and StartScheduledRecord methods copy an attacker provided string into a fixed size heap buffer. An attacker could leverage this to execute arbitrary code in the context of the browser.