{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T10:32:33.295","vulnerabilities":[{"cve":{"id":"CVE-2022-2471","sourceIdentifier":"cve-requests@bitdefender.com","published":"2022-09-15T14:15:09.640","lastModified":"2024-11-21T07:01:03.510","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Stack-based Buffer Overflow vulnerability in the EZVIZ Motion Detection component as used in camera models CS-CV248, CS-C6N-A0-1C2WFR, CS-DB1C-A0-1E2W2FR, CS-C6N-B0-1G2WF, CS-C3W-A0-3H4WFRL allows a remote attacker to execute remote code on the device. This issue affects: EZVIZ CS-CV248 versions prior to 5.2.3 build 220725. EZVIZ CS-C6N-A0-1C2WFR versions prior to 5.3.0 build 220428. EZVIZ CS-DB1C-A0-1E2W2FR versions prior to 5.3.0 build 220802. EZVIZ CS-C6N-B0-1G2WF versions prior to 5.3.0 build 220712. EZVIZ CS-C3W-A0-3H4WFRL versions prior to 5.3.5 build 220723."},{"lang":"es","value":"Una vulnerabilidad de Desbordamiento del Búfer en la región Stack de la Memoria en el componente de detección de movimiento de EZVIZ usado en los modelos de cámara CS-CV248, CS-C6N-A0-1C2WFR, CS-DB1C-A0-1E2W2FR, CS-C6N-B0-1G2WF, CS-C3W-A0-3H4WFRL permite a un atacante remoto ejecutar código remoto en el dispositivo. Este problema afecta a: EZVIZ CS-CV248 versiones anteriores a 5.2.3 build 220725. EZVIZ CS-C6N-A0-1C2WFR versiones anteriores a 5.3.0 build 220428. EZVIZ CS-DB1C-A0-1E2W2FR versiones anteriores a 5.3.0 build 220802. EZVIZ CS-C6N-B0-1G2WF versiones anteriores a versión 5.3.0 build 220712. EZVIZ CS-C3W-A0-3H4WFRL versiones anteriores a 5.3.5 build 220723"}],"metrics":{"cvssMetricV31":[{"source":"cve-requests@bitdefender.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"cve-requests@bitdefender.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ezviz:cs-c6n-a0-1c2wfr_firmware:5.3.0:build201719:*:*:*:*:*:*","matchCriteriaId":"47C0BBC0-DADA-4E4B-BD6D-09859B290EFC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ezviz:cs-c6n-a0-1c2wfr:-:*:*:*:*:*:*:*","matchCriteriaId":"5F7B9244-BE9E-4F6F-99E3-A08B46C4559E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ezviz:cs-db1c-a0-1e2w2fr_firmware:5.3.0:build211208:*:*:*:*:*:*","matchCriteriaId":"C18E7920-0F8F-4C00-A649-69FD9FDFAF33"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ezviz:cs-db1c-a0-1e2w2fr:-:*:*:*:*:*:*:*","matchCriteriaId":"FA3AD5A7-8DDE-4750-AF0B-54FD9620D2AB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ezviz:cs-c6n-b0-1g2wf_firmware:5.3.0:build210731:*:*:*:*:*:*","matchCriteriaId":"14FFD3A3-5A67-4828-AE11-2747493BE4D7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ezviz:cs-c6n-b0-1g2wf:-:*:*:*:*:*:*:*","matchCriteriaId":"53448693-4C67-4538-B879-12F3F8B51BEC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ezviz:cs-c3w-a0-3h4wfrl_firmware:5.3.5:build220120:*:*:*:*:*:*","matchCriteriaId":"6908D459-9F6A-44A0-BD35-CF61C0827EEF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ezviz:cs-c3w-a0-3h4wfrl:-:*:*:*:*:*:*:*","matchCriteriaId":"457F05D1-02C5-461A-93E3-E1D150BD60D4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ezviz:cs-cv248_firmware:5.2.1:build180403:*:*:*:*:*:*","matchCriteriaId":"54DA9047-AEB4-4C20-AC3D-9CA3B97C75C6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ezviz:cs-cv248:-:*:*:*:*:*:*:*","matchCriteriaId":"EE214B45-33B9-4C4D-AD19-0BB0DBC37ECD"}]}]}],"references":[{"url":"https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams","source":"cve-requests@bitdefender.com","tags":["Third Party Advisory"]},{"url":"https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}