Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wansview
Wansview wansview |
|
| Vendors & Products |
Wansview
Wansview wansview |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 26 Apr 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wansview 1.0.2 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying oversized input strings. Attackers can inject 2000-byte payloads into the Camera name and DID number fields during camera addition to trigger application crashes. | |
| Title | Wansview 1.0.2 Denial of Service via Buffer Overflow | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-27T13:47:15.716Z
Reserved: 2026-04-26T13:11:48.516Z
Link: CVE-2018-25297
Updated: 2026-04-27T13:46:53.783Z
Status : Deferred
Published: 2026-04-26T22:17:31.253
Modified: 2026-04-27T18:55:32.883
Link: CVE-2018-25297
No data.
OpenCVE Enrichment
Updated: 2026-04-28T13:30:32Z