CVE-2023-53879
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-15

Last updated on: 2025-12-18

Assigner: VulnCheck

Description
NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-15
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
eyemaxsystems nvclient 5.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2023-53879 is a stack-based buffer overflow vulnerability in NVClient version 5.0. It occurs in the user configuration contact field, where an attacker can paste a specially crafted payload that overwrites up to 846 bytes of stack memory. This overflow causes the application to crash, resulting in a denial of service (DoS) condition. The attack requires local access and user interaction. [1, 2]


How can this vulnerability impact me? :

This vulnerability can cause NVClient 5.0 to crash when a malicious payload is pasted into the contact field, leading to a denial of service (DoS) condition. This means legitimate users may be unable to use the application until it is restarted or fixed, potentially disrupting operations that rely on NVClient. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to reproduce the crash condition locally on the NVClient 5.0 application. Specifically, create a file containing 846 'A' characters (e.g., using a command like `python -c "print('A'*846)" > exploit.txt`), then launch NVClient, navigate to Config > User > Add users, and paste the contents of this file into the Contact field. If the application crashes upon submitting, the vulnerability is present. There are no network detection commands since the exploit is local and requires user interaction. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding pasting or entering excessively long inputs into the Contact field in NVClient 5.0 to prevent triggering the buffer overflow. Restrict user access to the application to trusted users only, and monitor for crashes related to user configuration changes. Applying any available patches or updates from the vendor once released is also recommended. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart