CVE-2024-6246

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers on the same network to execute arbitrary code on Wyze Cam v3 IP cameras without authentication. The flaw exists in the Realtek Wi-Fi driver where improper length validation of incoming data leads to heap buffer overflow. Attackers can gain kernel-level code execution on affected devices.

💻 Affected Systems

Products:
  • Wyze Cam v3
Versions: All versions prior to patched firmware
Operating Systems: Embedded Linux with Realtek Wi-Fi driver
Default Config Vulnerable: ⚠️ Yes
Notes: All Wyze Cam v3 devices with default configuration are vulnerable. Requires network adjacency but no authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent malware, access camera feeds, pivot to other network devices, or use the device as part of a botnet.

🟠

Likely Case

Device takeover enabling unauthorized access to camera streams, credential theft, or using the device for network reconnaissance and lateral movement.

🟢

If Mitigated

Limited impact if devices are isolated on separate VLANs with strict network segmentation and access controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

ZDI has published technical details but no public exploit code. The vulnerability requires network access but no authentication, making it attractive for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Wyze firmware updates for specific version

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-837/

Restart Required: Yes

Instructions:

1. Log into Wyze app
2. Navigate to device settings
3. Check for firmware updates
4. Apply available updates
5. Device will restart automatically

🔧 Temporary Workarounds

Network Segmentation

all

Isolate IoT devices on separate VLAN with strict firewall rules

Disable Wi-Fi if Wired Available

all

Use Ethernet connection instead of Wi-Fi if supported

🧯 If You Can't Patch

  • Place cameras on isolated IoT network segment with no access to critical systems
  • Implement strict firewall rules blocking all unnecessary inbound traffic to cameras

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Wyze app against latest available version from vendor

Check Version:

Check in Wyze app: Device Settings > Device Info > Firmware Version

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual network traffic patterns to/from cameras
  • Multiple failed connection attempts followed by successful exploit

Network Indicators:

  • Unusual outbound connections from cameras
  • Suspicious Wi-Fi driver related network traffic

SIEM Query:

source_ip IN (camera_ips) AND (protocol="tcp" OR protocol="udp") AND (port NOT IN [expected_ports])

🔗 References

📤 Share & Export