{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T03:47:41.020","vulnerabilities":[{"cve":{"id":"CVE-2019-11560","sourceIdentifier":"cve@mitre.org","published":"2019-05-07T16:29:00.247","lastModified":"2024-11-21T04:21:21.033","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the streaming server provided by hisilicon in HI3516 models allows an unauthenticated attacker to remotely run arbitrary code by sending a special RTSP over HTTP packet. The vulnerability was found in many cameras using hisilicon's hardware and software, as demonstrated by TENVIS cameras 1.3.3.3, 1.2.7.2, 1.2.1.4, 7.1.20.1.2, and 13.1.1.1.7.2; FDT FD7902 11.3.14.1.3 and 10.3.14.1.3; FOSCAM cameras 3.2.1.1.1_0815 and 3.2.2.2.1_0815; and Dericam cameras V11.3.8.1.12."},{"lang":"es","value":"Una vulnerabilidad de desbordamiento de búfer en el servidor streaming provisto por hisilicon en los modelos HI3516 permite que un atacante no autenticado ejecute código arbitrario de forma remota por medio del envío de un componente RTSP especial sobre un paquete HTTP. La vulnerabilidad fue encontrada en muchas cámaras que usan hardware y software de hisilicon, como es demostrado por las cámaras TENVIS versiones 1.3.3.3, 1.2.7.2, 1.2.1.4, 7.1.20.1.2 y 13.1.1.1.7.2; FDT FD7902 versiones 11.3.14.1.3 y 10.3.14.1.3; Cámaras FOSCAM versiones 3.2.1.1.1_0815 y 3.2.2.2.1_0815; y cámaras Dericam versiones V11.3.8.1.12."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hisilicon:hi3516_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"4EECE373-2857-44E2-B8AC-46E479E271A0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hisilicon:hi3516:-:*:*:*:*:*:*:*","matchCriteriaId":"603305E7-5797-46D7-9653-16E87F56387C"}]}]}],"references":[{"url":"https://gist.github.com/vulnfan1337/e95c2dba75ad93a1a325c6ace950eba9","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://gist.github.com/vulnfan1337/e95c2dba75ad93a1a325c6ace950eba9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}