CVE-2024-51348
Awaiting Analysis Awaiting Analysis - Queue
Stack-Based Buffer Overflow in BS Producten Petcam P2P API Enables RCE

Publication date: 2026-03-25

Last updated on: 2026-03-25

Assigner: MITRE

Description
A stack-based buffer overflow vulnerability in the P2P API service in BS Producten Petcam with firmware 33.1.0.0818 allows unauthenticated attackers within network range to overwrite the instruction pointer and achieve Remote Code Execution (RCE) by sending a specially crafted HTTP request.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bs_producten petcam 33.1.0.0818
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The impact of this vulnerability is that an attacker can achieve Remote Code Execution (RCE) on the affected device without authentication. This means the attacker could potentially take full control of the device, execute malicious code, disrupt device functionality, or use the device as a foothold to attack other systems on the network.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers within network range to achieve remote code execution on the BS Producten Petcam device, leading to full system compromise.

This compromise enables attackers to access sensitive data such as live camera streams and stored credentials, which could include personal or confidential information.

Such unauthorized access and potential data breaches could violate common standards and regulations like GDPR and HIPAA, which mandate protection of personal and sensitive data.

Therefore, the vulnerability poses a significant risk to compliance by exposing sensitive data to unauthorized parties and undermining data confidentiality, integrity, and availability.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending a specially crafted HTTP request to the device's P2P API service on port 8001 and observing if the service crashes due to a buffer overflow.

A proof of concept involves sending an overly long string as the [resource] part of the URI in a request like: http://{IP}:8001/[resource]?mode=[arg]. If the device crashes or the service becomes unresponsive, it indicates the presence of the vulnerability.

Example command using curl to test for crash (replace {IP} with device IP):

  • curl -v "http://{IP}:8001/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA?mode=test"

If the service crashes or stops responding after this request, it confirms the vulnerability.

Additionally, network scanning tools can be used to identify devices exposing port 8001 with the P2P API service, which is the attack surface for this vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Since no official patch is available, immediate mitigation steps include isolating the vulnerable device to reduce exposure.

  • Place the device on a dedicated VLAN that is disconnected from the internet and the primary internal network.
  • Disable the "Local Mode" wireless network or secure it by requiring a password to prevent unauthenticated access.
  • Disable ONVIF and related P2P services on the device if possible.
  • Avoid using the "Local Mode" feature to prevent attackers from joining the unauthenticated local network.

Long term recommendations include using bounds-checked functions in the firmware and enabling modern binary protections, but these require vendor action.


Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow in the P2P API service of BS Producten Petcam firmware version 33.1.0.0818. It allows unauthenticated attackers who are within network range to send a specially crafted HTTP request that overwrites the instruction pointer, enabling them to execute arbitrary code remotely.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart