CVE-2024-52547

7.2 HIGH

📋 TL;DR

An authenticated attacker can exploit a stack-based buffer overflow in the DHIP Service on TCP port 80 of affected Lorex security cameras. This could allow remote code execution or denial of service. Users of vulnerable Lorex 2K Indoor Wi-Fi Security Camera firmware versions are affected.

💻 Affected Systems

Products:
  • Lorex 2K Indoor Wi-Fi Security Camera
Versions: Firmware versions prior to 2.800.0000000.8.R.20241111
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker authentication to the camera's web interface or DHIP service.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with authenticated attacker privileges, potentially leading to full device compromise, lateral movement, or persistent backdoor installation.

🟠

Likely Case

Denial of service causing camera malfunction or crash, potentially disrupting security monitoring.

🟢

If Mitigated

Limited impact if network segmentation prevents access to camera management interfaces from untrusted networks.

🌐 Internet-Facing: HIGH if cameras are exposed to the internet with default credentials or weak authentication.
🏢 Internal Only: MEDIUM if internal attackers have camera access credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit code is publicly available on GitHub. Requires authentication to the camera's web interface or DHIP service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.800.0000000.8.R.20241111

Vendor Advisory: https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/

Restart Required: Yes

Instructions:

1. Log into camera web interface. 2. Navigate to firmware update section. 3. Upload firmware version 2.800.0000000.8.R.20241111. 4. Apply update and wait for camera to reboot.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on separate VLAN without internet access.

Access Control

all

Restrict access to camera management interfaces to trusted IP addresses only.

🧯 If You Can't Patch

  • Segment cameras on isolated network without internet access.
  • Implement strict firewall rules blocking all external access to TCP port 80 on cameras.

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via camera web interface or by attempting to connect to TCP port 80 and examining service banner.

Check Version:

curl -s http://[CAMERA_IP]/cgi-bin/getSystemInfo | grep FirmwareVersion

Verify Fix Applied:

Confirm firmware version shows 2.800.0000000.8.R.20241111 or later in camera settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to camera web interface
  • DHIP service crash logs
  • Multiple failed buffer overflow attempts in system logs

Network Indicators:

  • Unusual traffic patterns to camera port 80
  • Malformed packets to DHIP service

SIEM Query:

source="camera_logs" AND (event="authentication_failure" OR event="service_crash")

🔗 References

📤 Share & Export