A buffer overflow vulnerability exists in the ONVIF GetStreamUri function of LSC Indoor Camera V7.6.32. The application fails to validate the length of the Protocol parameter inside the Transport element. By sending a specially crafted SOAP request containing an oversized protocol string, an attacker can overflow the stack buffer, overwriting the return instruction pointer (RIP). This vulnerability allows for Denial of Service (DoS) via device crash or Remote Code Execution (RCE) in the context of the ONVIF service.
History

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title Stack‑Based Buffer Overflow in ONVIF GetStreamUri Leading to DoS or RCE

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
CWE-20
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Fri, 27 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in the ONVIF GetStreamUri function of LSC Indoor Camera V7.6.32. The application fails to validate the length of the Protocol parameter inside the Transport element. By sending a specially crafted SOAP request containing an oversized protocol string, an attacker can overflow the stack buffer, overwriting the return instruction pointer (RIP). This vulnerability allows for Denial of Service (DoS) via device crash or Remote Code Execution (RCE) in the context of the ONVIF service.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-03-27T00:00:00.000Z

Updated: 2026-03-27T18:55:01.816Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69986

cve-icon Vulnrichment

Updated: 2026-03-27T18:54:15.619Z

cve-icon NVD

Status : Received

Published: 2026-03-27T15:16:45.887

Modified: 2026-03-27T19:16:42.040

Link: CVE-2025-69986

cve-icon Redhat

No data.