Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Indoor_camera_se_firmware
(Roku)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-05-15 | CVE-2023-6322 | A stack-based buffer overflow vulnerability exists in the message parsing functionality of the Roku Indoor Camera SE version 3.0.2.4679 and Wyze Cam v3 version 4.36.11.5859. A specially crafted message can lead to stack-based buffer overflow. An attacker can make authenticated requests to trigger this vulnerability. | Indoor_camera_se_firmware, Kalay_platform, Cam_v3_firmware | 8.8 | ||
2024-05-15 | CVE-2023-6323 | ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server. | Cam_2_firmware, Cam_firmware, Indoor_camera_se_firmware, Kalay_platform, Cam_v3_firmware | 6.5 | ||
2024-05-15 | CVE-2023-6324 | ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity | Cam_2_firmware, Cam_firmware, Indoor_camera_se_firmware, Kalay_platform, Cam_v3_firmware | 8.8 |