Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51347: n/a

0
High
VulnerabilityCVE-2024-51347cvecve-2024-51347
Published: Wed Mar 25 2026 (03/25/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A buffer overflow vulnerability in the dgiot binary in LSC Smart Indoor IP Camera V7.6.32. The flaw exists in the handling of the Time Zone (TZ) parameter within the ONVIF configuration interface. The time zone (TZ) parameter does not have its length properly validated before being copied into a fixed-size buffer using the insecure strcpy function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 14:18:17 UTC

Technical Analysis

CVE-2024-51347 is a buffer overflow vulnerability identified in the dgiot binary component of LSC Smart Indoor IP Camera firmware version 7.6.32. The vulnerability stems from improper handling of the Time Zone (TZ) parameter within the ONVIF configuration interface. Specifically, the TZ parameter's length is not validated before being copied into a fixed-size buffer using the unsafe strcpy function, which does not perform bounds checking. This lack of validation allows an attacker to supply an overly long TZ string, causing a buffer overflow. Buffer overflows can lead to memory corruption, enabling attackers to execute arbitrary code, crash the device, or disrupt normal operation. The ONVIF interface is commonly used for device configuration and management, and if exposed to untrusted networks, it can be targeted remotely. Although no public exploits have been reported yet, the vulnerability's nature and the use of unsafe string functions make it a high-risk issue. The absence of a CVSS score requires an assessment based on impact and exploitability factors. The vulnerability affects the confidentiality, integrity, and availability of the device, as attackers could potentially gain control or disrupt the camera's operation. The vulnerability does not require user interaction but does require access to the ONVIF interface, which may be exposed on internal or external networks depending on deployment. The lack of patch information suggests that vendors or users should urgently seek firmware updates or implement mitigations.

Potential Impact

The impact of CVE-2024-51347 is significant for organizations deploying LSC Smart Indoor IP Cameras, especially in security-sensitive environments such as corporate offices, government facilities, and critical infrastructure. Successful exploitation could allow attackers to execute arbitrary code on the device, leading to full compromise of the camera. This could result in unauthorized surveillance, manipulation or disabling of video feeds, and use of the compromised device as a foothold for lateral movement within the network. Additionally, denial of service attacks could disrupt security monitoring capabilities. The vulnerability undermines the confidentiality, integrity, and availability of the affected devices. Given the widespread use of ONVIF-compliant cameras and the common practice of exposing such devices to networks without sufficient segmentation, the risk is elevated. Organizations relying on these cameras for physical security may face increased risk of espionage, data leakage, or operational disruption.

Mitigation Recommendations

To mitigate CVE-2024-51347, organizations should first check with the vendor for any available firmware updates that address this vulnerability and apply them promptly. If no patch is available, network-level mitigations should be implemented, including restricting access to the ONVIF interface via firewall rules or network segmentation, limiting it to trusted management networks only. Disabling the ONVIF interface if not required can reduce the attack surface. Monitoring network traffic for unusual or malformed ONVIF requests may help detect exploitation attempts. Employing intrusion detection or prevention systems with signatures targeting buffer overflow attempts on ONVIF protocols can provide additional defense. Vendors and integrators should review and update their software development practices to replace unsafe string functions like strcpy with safer alternatives that perform bounds checking, such as strncpy or strlcpy. Regular security assessments and penetration testing of IP camera deployments are recommended to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c3eaa6f4197a8e3b5259dc

Added to database: 3/25/2026, 2:01:10 PM

Last enriched: 3/25/2026, 2:18:17 PM

Last updated: 3/26/2026, 5:25:22 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses