CVE-2022-2471

Stack-Based Buffer Overflow Vulnerability in the EZVIZ Motion Detection component

Description

Stack-based Buffer Overflow vulnerability in the EZVIZ Motion Detection component as used in camera models CS-CV248, CS-C6N-A0-1C2WFR, CS-DB1C-A0-1E2W2FR, CS-C6N-B0-1G2WF, CS-C3W-A0-3H4WFRL allows a remote attacker to execute remote code on the device. This issue affects: EZVIZ CS-CV248 versions prior to 5.2.3 build 220725. EZVIZ CS-C6N-A0-1C2WFR versions prior to 5.3.0 build 220428. EZVIZ CS-DB1C-A0-1E2W2FR versions prior to 5.3.0 build 220802. EZVIZ CS-C6N-B0-1G2WF versions prior to 5.3.0 build 220712. EZVIZ CS-C3W-A0-3H4WFRL versions prior to 5.3.5 build 220723.

Remediation

Solution:

  • Firmware versions for each product model that fixes the vulnerability are available below: EZVIZ CS-CV248 version 5.2.3 build 220725 and newer. EZVIZ CS-C6N-A0-1C2WFR version 5.3.0 build 220428 and newer. EZVIZ CS-DB1C-A0-1E2W2FR version 5.3.0 build 220802 and newer. EZVIZ CS-C6N-B0-1G2WF version 5.3.0 build 220712 and newer. EZVIZ CS-C3W-A0-3H4WFRL version 5.3.5 build 220723 and newer.

Category

9.9
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 1.24% Top 25%
Third-Party Advisory bitdefender.com
Affected: EZVIZ CS-CV248
Affected: EZVIZ CS-C6N-A0-1C2WFR
Affected: EZVIZ CS-DB1C-A0-1E2W2FR
Affected: EZVIZ CS-C6N-B0-1G2WF
Affected: EZVIZ CS-C3W-A0-3H4WFRL
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-2471?
CVE-2022-2471 has been scored as a critical severity vulnerability.
How to fix CVE-2022-2471?
To fix CVE-2022-2471: Firmware versions for each product model that fixes the vulnerability are available below: EZVIZ CS-CV248 version 5.2.3 build 220725 and newer. EZVIZ CS-C6N-A0-1C2WFR version 5.3.0 build 220428 and newer. EZVIZ CS-DB1C-A0-1E2W2FR version 5.3.0 build 220802 and newer. EZVIZ CS-C6N-B0-1G2WF version 5.3.0 build 220712 and newer. EZVIZ CS-C3W-A0-3H4WFRL version 5.3.5 build 220723 and newer.
Is CVE-2022-2471 being actively exploited in the wild?
It is possible that CVE-2022-2471 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-2471?
CVE-2022-2471 affects EZVIZ CS-CV248, EZVIZ CS-C6N-A0-1C2WFR, EZVIZ CS-DB1C-A0-1E2W2FR, EZVIZ CS-C6N-B0-1G2WF, EZVIZ CS-C3W-A0-3H4WFRL.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.