CVE-2024-51348
Description
A stack-based buffer overflow vulnerability in the P2P API service in BS Producten Petcam with firmware 33.1.0.0818 allows unauthenticated attackers within network range to overwrite the instruction pointer and achieve Remote Code Execution (RCE) by sending a specially crafted HTTP request.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stack-based buffer overflow in BS Producten Petcam P2P API allows unauthenticated RCE via crafted HTTP request within network range.
Vulnerability
A stack-based buffer overflow vulnerability exists in the P2P API service (port 8001) of BS Producten Petcam firmware 33.1.0.0818. The service parses HTTP URI resources and concatenates them with "./html/" into a 260-byte stack buffer without length validation. An overly long resource name triggers a buffer overflow, allowing overwrite of the instruction pointer [1].
Exploitation
An unauthenticated attacker within network range can exploit this by sending a specially crafted HTTP request to port 8001. The device emits an unauthenticated "local mode" wireless network by default, further lowering the barrier to exploitation [2]. The binary lacks modern mitigations such as stack canaries or ASLR [1].
Impact
Successful exploitation allows remote code execution with root privileges, granting full control over the device. Additionally, the device contains hardcoded credentials (root:cxlinux, admin:12345678) and an unauthenticated RTSP stream, compounding the risk [2].
Mitigation
As of firmware version 33.1.0.0818, no official patch has been released. Users should isolate the device from untrusted networks and consider disabling local mode if possible [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- BS Producten/Petcamdescription
- Range: = 33.1.0.0818
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.