7.5
CVSSv2

CVE-2020-9527

Published: 10/08/2020 Updated: 18/08/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20, after 2018-08-09 through 2020), as used by many different vendors in millions of Internet of Things devices, suffers from buffer overflow vulnerability that allows unauthenticated remote malicious users to execute arbitrary code via the peer-to-peer (P2P) service. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hichip shenzhen hichip vision technology firmware

Github Repositories

Exploit development and reversing of Hichip's P2P camera firmware

Hichip P2P firmware RCE Exploit development and reversing of Hichip's P2P camera firmware POC , Twitter , Pax0r Contents index Overview CamHI applications analysis Firmware analysis Exploitation 1st approach 2nd approach References Bonus Overview First of all, thanks to the researcher @pmarrapese and his awesome #DEF