Description
NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition.
Problem types
Product status
Credits
Ahmet Ümit BAYRAM
References
www.exploit-db.com/exploits/51700
download.eyemaxdvr.com/...ance Management Software(V5.0).pdf
www.exploit-db.com/exploits/51700 (ExploitDB-51700)
download.eyemaxdvr.com/...ance Management Software(V5.0).pdf (NVClient Product Documentation)
www.vulncheck.com/...ow-vulnerability-via-user-configuration (VulnCheck Advisory: NVClient 5.0 Stack Buffer Overflow Vulnerability via User Configuration)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.