Sony IPELA Network Camera 1.82.01 contains a stack buffer overflow vulnerability in the ftpclient.cgi endpoint that allows remote attackers to execute arbitrary code. Attackers can exploit the vulnerability by sending a crafted POST request with oversized data to the FTP client functionality, potentially causing remote code execution or denial of service.
References
| Link | Resource |
|---|---|
| https://pro.sony/en_NL/support-resources/snc-dh120/ | Broken Link |
| https://pro.sony/en_NL/support-resources/snc-dh120/software/mpengb00000928 | Release Notes |
| https://www.exploit-db.com/exploits/48842 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/sony-ipela-network-camera-remote-stack-buffer-overflow-via-ftpclientcgi | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5596.php | Third Party Advisory |
| https://www.exploit-db.com/exploits/48842 | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5596.php | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2026-01-02 21:20
NVD link : CVE-2020-36885
Mitre link : CVE-2020-36885
CVE.ORG link : CVE-2020-36885
JSON object : View
Products Affected
sony
- snc-dh120t
- snc-dh120t_firmware
CWE
CWE-787
Out-of-bounds Write
