Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51348: n/a

0
High
VulnerabilityCVE-2024-51348cvecve-2024-51348
Published: Wed Mar 25 2026 (03/25/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A stack-based buffer overflow vulnerability in the P2P API service in BS Producten Petcam with firmware 33.1.0.0818 allows unauthenticated attackers within network range to overwrite the instruction pointer and achieve Remote Code Execution (RCE) by sending a specially crafted HTTP request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 14:18:01 UTC

Technical Analysis

CVE-2024-51348 is a stack-based buffer overflow vulnerability identified in the P2P API service of BS Producten Petcam devices running firmware version 33.1.0.0818. The vulnerability arises from improper bounds checking when processing HTTP requests, allowing an attacker to overwrite the instruction pointer on the stack. This memory corruption enables remote code execution (RCE) without requiring authentication or user interaction, provided the attacker is within network range of the device. The P2P API service is exposed on the device to facilitate peer-to-peer communication, commonly used for remote access and control of the camera. By sending a specially crafted HTTP request, an attacker can exploit this flaw to execute arbitrary code with the privileges of the service, potentially gaining full control over the device. The lack of a CVSS score indicates that the vulnerability is newly published and may not yet have an official severity rating, but the technical details suggest a critical impact. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. However, the vulnerability's characteristics—unauthenticated remote code execution with no user interaction—make it a high-risk issue for affected devices. BS Producten Petcam devices are IoT cameras used in various environments, including residential, commercial, and industrial settings, making the vulnerability relevant to a broad user base. The attack vector requires network proximity, which may limit remote exploitation but still poses a significant threat in local networks or poorly segmented environments.

Potential Impact

The primary impact of CVE-2024-51348 is the potential for complete compromise of affected BS Producten Petcam devices. Successful exploitation allows attackers to execute arbitrary code remotely, which can lead to unauthorized surveillance, data exfiltration, device manipulation, or pivoting to other network assets. Organizations relying on these IoT cameras for security or monitoring could face breaches of confidentiality and integrity, as attackers may disable or manipulate camera feeds. The vulnerability also threatens availability if exploited to crash or disable devices. Given the widespread deployment of IoT cameras in homes, businesses, and critical infrastructure, the risk extends to privacy violations and operational disruptions. The unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments with weak network segmentation or exposed IoT devices. Although no known exploits are currently in the wild, the vulnerability could be targeted by attackers seeking footholds in local networks or to conduct espionage. The impact is particularly severe for organizations that depend on these devices for security monitoring or that have sensitive environments where camera compromise could lead to further network intrusion.

Mitigation Recommendations

To mitigate CVE-2024-51348, organizations and users should first seek firmware updates from BS Producten that address this buffer overflow vulnerability. If patches are not yet available, immediate steps include isolating affected devices on segmented networks to limit attacker access to the P2P API service. Network administrators should restrict access to the camera's management interfaces using firewall rules or VLAN segmentation, allowing only trusted hosts to communicate with the device. Disabling unnecessary services or remote access features on the cameras can reduce the attack surface. Monitoring network traffic for unusual HTTP requests targeting the P2P API service may help detect exploitation attempts. Additionally, organizations should implement strong network access controls and consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous activity related to IoT devices. Regularly auditing IoT device firmware versions and configurations will help ensure timely application of security updates once available. Finally, educating users about the risks of exposing IoT devices to untrusted networks can reduce the likelihood of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c3eaa6f4197a8e3b5259e0

Added to database: 3/25/2026, 2:01:10 PM

Last enriched: 3/25/2026, 2:18:01 PM

Last updated: 3/26/2026, 5:25:23 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses