A stack-based buffer overflow vulnerability exists in the message parsing functionality of the Roku Indoor Camera SE version 3.0.2.4679 and Wyze Cam v3 version 4.36.11.5859. A specially crafted message can lead to stack-based buffer overflow. An attacker can make authenticated requests to trigger this vulnerability.
References
Link | Resource |
---|---|
https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ | Exploit Third Party Advisory |
https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
History
11 Feb 2025, 21:32
Type | Values Removed | Values Added |
---|---|---|
First Time |
Throughtek
Throughtek kalay Platform Roku indoor Camera Se Firmware Roku Wyze cam V3 Wyze Wyze cam V3 Firmware Roku indoor Camera Se |
|
CWE | CWE-787 | |
References | () https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:* cpe:2.3:o:roku:indoor_camera_se_firmware:3.0.2.4679:*:*:*:*:*:*:* cpe:2.3:a:throughtek:kalay_platform:-:*:*:*:*:*:*:* cpe:2.3:o:wyze:cam_v3_firmware:4.36.11.5859:*:*:*:*:*:*:* cpe:2.3:h:roku:indoor_camera_se:-:*:*:*:*:*:*:* |
21 Nov 2024, 08:43
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ - |
15 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-15 13:15
Updated : 2025-02-11 21:32
NVD link : CVE-2023-6322
Mitre link : CVE-2023-6322
CVE.ORG link : CVE-2023-6322
JSON object : View
Products Affected
wyze
- cam_v3_firmware
- cam_v3
roku
- indoor_camera_se
- indoor_camera_se_firmware
throughtek
- kalay_platform