Home

Description

NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition.

PUBLISHED Reserved 2025-12-13 | Published 2025-12-15 | Updated 2025-12-15 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

Stack-based Buffer Overflow

Product status

5.0
affected

Credits

Ahmet Ümit BAYRAM finder

References

www.exploit-db.com/exploits/51700 exploit

download.eyemaxdvr.com/...ance Management Software(V5.0).pdf exploit

www.exploit-db.com/exploits/51700 (ExploitDB-51700) exploit

download.eyemaxdvr.com/...ance Management Software(V5.0).pdf (NVClient Product Documentation) product

www.vulncheck.com/...ow-vulnerability-via-user-configuration (VulnCheck Advisory: NVClient 5.0 Stack Buffer Overflow Vulnerability via User Configuration) third-party-advisory

cve.org (CVE-2023-53879)

nvd.nist.gov (CVE-2023-53879)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.