Advisory Details

July 30th, 2025

(Pwn2Own) Lorex 2K Indoor Wi-Fi Security Camera Stack-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-25-731
ZDI-CAN-25537

CVE ID CVE-2024-52544
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Lorex
AFFECTED PRODUCTS 2K Indoor Wi-Fi Security Camera
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lorex 2K Indoor Wi-Fi Security Cameras. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the sonia module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS

Fixed in Firmware Version V2.800.0000000.8.R.20241111


DISCLOSURE TIMELINE
  • 2024-11-20 - Vulnerability reported to vendor
  • 2025-07-30 - Coordinated public release of advisory
  • 2025-07-30 - Advisory Updated
CREDIT phudq and namnp from Viettel Cyber Security
BACK TO ADVISORIES