NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition.
References
| Link | Resource |
|---|---|
| http://download.eyemaxdvr.com/DVST%20ST%20SERIES/CMS/Video%20Surveillance%20Management%20Software(V5.0).pdf | Product |
| https://www.exploit-db.com/exploits/51700 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/nvclient-stack-buffer-overflow-vulnerability-via-user-configuration | Third Party Advisory |
| http://download.eyemaxdvr.com/DVST%20ST%20SERIES/CMS/Video%20Surveillance%20Management%20Software(V5.0).pdf | Product |
| https://www.exploit-db.com/exploits/51700 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-15 21:15
Updated : 2025-12-18 22:36
NVD link : CVE-2023-53879
Mitre link : CVE-2023-53879
CVE.ORG link : CVE-2023-53879
JSON object : View
Products Affected
eyemaxsystems
- nvclient
