First published: Fri Oct 25 2019(Updated: )
Milesight IP security cameras through 2016-11-14 have a buffer overflow in a web application via a long username or password.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Milesight IP security camera firmware | <=2016-11-14 | |
Milesight NCR Camera |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2356 is classified as having a medium severity due to its potential to cause a buffer overflow, leading to unauthorized access.
To fix CVE-2016-2356, upgrade the Milesight IP security camera firmware to a version released after November 14, 2016.
CVE-2016-2356 affects Milesight IP security cameras firmware versions up to and including 2016-11-14.
The risks associated with CVE-2016-2356 include remote code execution and potential unauthorized access to the camera's functions.
Yes, CVE-2016-2356 can be exploited remotely by sending crafted requests with long usernames or passwords to the vulnerable camera's web application.