Product:

Cam_v3_firmware

(Wyze)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 5
Date Id Summary Products Score Patch Annotated
2024-05-15 CVE-2023-6322 A stack-based buffer overflow vulnerability exists in the message parsing functionality of the Roku Indoor Camera SE version 3.0.2.4679 and Wyze Cam v3 version 4.36.11.5859. A specially crafted message can lead to stack-based buffer overflow. An attacker can make authenticated requests to trigger this vulnerability. Indoor_camera_se_firmware, Kalay_platform, Cam_v3_firmware 8.8
2024-05-15 CVE-2023-6323 ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server. Cam_2_firmware, Cam_firmware, Indoor_camera_se_firmware, Kalay_platform, Cam_v3_firmware 6.5
2024-05-15 CVE-2023-6324 ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity Cam_2_firmware, Cam_firmware, Indoor_camera_se_firmware, Kalay_platform, Cam_v3_firmware 8.8
2022-03-30 CVE-2019-9564 A vulnerability in the authentication logic of Wyze Cam Pan v2, Cam v2, Cam v3 allows an attacker to bypass login and control the devices. This issue affects: Wyze Cam Pan v2 versions prior to 4.49.1.47. Wyze Cam v2 versions prior to 4.9.8.1002. Wyze Cam v3 versions prior to 4.36.8.32. Cam_pan_v2_firmware, Cam_v2_firmware, Cam_v3_firmware 9.8
2022-03-30 CVE-2019-12266 Stack-based Buffer Overflow vulnerability in Wyze Cam Pan v2, Cam v2, Cam v3 allows an attacker to run arbitrary code on the affected device. This issue affects: Wyze Cam Pan v2 versions prior to 4.49.1.47. Wyze Cam v2 versions prior to 4.9.8.1002. Wyze Cam v3 versions prior to 4.36.8.32. Cam_pan_v2_firmware, Cam_v2_firmware, Cam_v3_firmware 9.8