Lucene search

K
cvelistMitreCVELIST:CVE-2020-9527
HistoryAug 10, 2020 - 3:24 p.m.

CVE-2020-9527

2020-08-1015:24:50
mitre
www.cve.org
2
firmware
buffer overflow
vulnerability
internet of things
remote attack
p2p service
shenzhen hichip vision technology
accfly
alptop
anlink
besdersec
boavision
cooau
cpvan
ctronics
d3d security
dericam
elex system
elite security
enster
epges
escam
floureon
genbolt
hongjingtian
icami
iegeek
jecurity
jennov
kkmoon
leftek
loosafe
luowice
nesuniq
nettoly
proelite
qzt
royallite
sdeter
sv3c
sy2l
tenvis
thinkvalue
tomlov
tptek
wgcc
zilink.

AI Score

10

Confidence

High

EPSS

0.01

Percentile

83.5%

Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20, after 2018-08-09 through 2020), as used by many different vendors in millions of Internet of Things devices, suffers from buffer overflow vulnerability that allows unauthenticated remote attackers to execute arbitrary code via the peer-to-peer (P2P) service. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.

AI Score

10

Confidence

High

EPSS

0.01

Percentile

83.5%

Related for CVELIST:CVE-2020-9527