← Advisories

Sony IPELA Network Camera (ftpclient.cgi) Remote Stack Buffer Overflow

High
Advisory ID
ZSL-2020-5596
Release Date
30 September 2020
Vendor
Sony Electronics Inc. - https://pro.sony
Affected Version
SNC-DH120T v1.82.01
CVE
N/A
Tested On
gen5th/1.x
Summary

IPELA is Sony's vision of the ultimate workplace, designed to revolutionize the way business communicates over global IP networks. IPELA products can improve the efficiency of your organization by connecting people and places with high-quality audio and video. The SNC-DH120T is an indoor tamper proof, high definition (720p) minidome network security camera with Electronic Day/Night settings, DEPA analysis and is ONVIF compliant. It supports dual streaming of H.264, MPEG-4 and JPEG at full frame-rate.

Description

The vulnerability is caused due to a boundary error in the processing of received FTP traffic through the FTP client functionality (ftpclient.cgi), which can be exploited to cause a stack-based buffer overflow when a user issues a POST request to connect to a malicious FTP server. Successful exploitation could allow execution of arbitrary code on the affected device or cause denial of service scenario.

Proof of Concept
Disclosure Timeline
17.09.2019Vulnerability discovered.
28.10.2019Vendor contacted.
08.05.2020Working with the vendor.
03.06.2020Vendor already produced a patch for this issue long time ago.
30.09.2020Public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
30.09.2020Initial release
06.10.2020Added reference [1], [2], [3] and [4]