### [CVE-2021-33549](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33549) ![](https://img.shields.io/static/v1?label=Product&message=E2%20Series&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Encoder%20G-Code&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%20Stack-based%20Buffer%20Overflow&color=brightgreen) ### Description Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the action parameter, which may allow an attacker to remotely execute arbitrary code. ### POC #### Reference - http://packetstormsecurity.com/files/164191/Geutebruck-instantrec-Remote-Command-Execution.html - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ #### Github - https://github.com/ARPSyndicate/cvemon