{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6246","assignerOrgId":"99f1926a-a320-47d8-bbb5-42feb611262e","state":"PUBLISHED","assignerShortName":"zdi","dateReserved":"2024-06-21T14:52:16.771Z","datePublished":"2024-11-22T20:05:40.747Z","dateUpdated":"2024-12-04T21:43:36.425Z"},"containers":{"cna":{"providerMetadata":{"orgId":"99f1926a-a320-47d8-bbb5-42feb611262e","shortName":"zdi","dateUpdated":"2024-11-22T20:05:40.747Z"},"title":"Wyze Cam v3 Realtek Wi-Fi Driver Heap-Based Buffer Overflow Remote Code Execution Vulnerability","descriptions":[{"lang":"en","value":"Wyze Cam v3 Realtek Wi-Fi Driver Heap-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Wyze Cam v3 IP cameras. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the Realtek Wi-Fi kernel module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the kernel. Was ZDI-CAN-22310."}],"affected":[{"vendor":"Wyze","product":"Cam v3","versions":[{"version":"4.36.11.7071","status":"affected"}],"defaultStatus":"unknown"}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-122","description":"CWE-122: Heap-based Buffer Overflow","type":"CWE"}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-24-837/","name":"ZDI-24-837","tags":["x_research-advisory"]}],"dateAssigned":"2024-06-21T14:52:16.785Z","datePublic":"2024-06-21T20:26:19.788Z","source":{"lang":"en","value":"Vincent DEHORS (@vdehors), Kevin DENIS (@0xmitsurugi), Romain KRAFT (@Areizen_) from Synacktiv (@Synacktiv)"},"metrics":[{"format":"CVSS","cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.6,"baseSeverity":"CRITICAL"}}]},"adp":[{"affected":[{"vendor":"wyze","product":"cam_v3_firmware","cpes":["cpe:2.3:o:wyze:cam_v3_firmware:4.36.11.7071:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"4.36.11.7071","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-26T15:16:12.893116Z","id":"CVE-2024-6246","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-04T21:43:36.425Z"}}]}}