First published: Tue Jan 13 2015(Updated: )
Stack-based buffer overflow in UltraCamLib in the UltraCam ActiveX Control (UltraCamX.ocx) for the TRENDnet SecurView camera TV-IP422WN allows remote attackers to execute arbitrary code via a long string to the (1) CGI_ParamSet, (2) OpenFileDlg, (3) SnapFileName, (4) Password, (5) SetCGIAPNAME, (6) AccountCode, or (7) RemoteHost function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tv-ip422w | ||
Trendnet Tv-ip422wn |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-10011 is rated as high severity due to the potential for remote code execution.
To mitigate CVE-2014-10011, update the UltraCam ActiveX Control to the latest version provided by Trendnet.
CVE-2014-10011 affects the TRENDnet SecurView camera models TV-IP422W and TV-IP422WN.
CVE-2014-10011 allows for a stack-based buffer overflow, enabling the execution of arbitrary code.
Yes, CVE-2014-10011 is specifically related to the UltraCam ActiveX Control (UltraCamX.ocx).