ID

VAR-201905-0840


CVE

CVE-2018-4016


TITLE

Roav A1 Dashcam Buffer error vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2018-015434 // CNNVD: CNNVD-201905-320

DESCRIPTION

An exploitable code execution vulnerability exists in the URL-parsing functionality of the Roav A1 Dashcam running version RoavA1SWV1.9. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability. Roav A1 Dashcam Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Roav A1 Dashcam is a car HD camera. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc

Trust: 1.8

sources: NVD: CVE-2018-4016 // JVNDB: JVNDB-2018-015434 // VULHUB: VHN-134047 // VULMON: CVE-2018-4016

AFFECTED PRODUCTS

vendor:anker inmodel:roav dashcam a1scope:eqversion:roava1swv1.9

Trust: 1.0

vendor:anker innovationsmodel:roav dashcam a1scope:eqversion:roava1swv1.9

Trust: 0.8

sources: JVNDB: JVNDB-2018-015434 // NVD: CVE-2018-4016

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-4016
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2018-4016
value: HIGH

Trust: 1.0

NVD: CVE-2018-4016
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201905-320
value: HIGH

Trust: 0.6

VULHUB: VHN-134047
value: HIGH

Trust: 0.1

VULMON: CVE-2018-4016
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-4016
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2018-4016
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.9

VULHUB: VHN-134047
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-4016
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2018-4016
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 6.0
version: 3.0

Trust: 1.0

NVD: CVE-2018-4016
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-134047 // VULMON: CVE-2018-4016 // JVNDB: JVNDB-2018-015434 // CNNVD: CNNVD-201905-320 // NVD: CVE-2018-4016 // NVD: CVE-2018-4016

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-134047 // JVNDB: JVNDB-2018-015434 // NVD: CVE-2018-4016

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201905-320

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201905-320

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015434

PATCH

title:Top Pageurl:http://www.anker-in.com/

Trust: 0.8

sources: JVNDB: JVNDB-2018-015434

EXTERNAL IDS

db:TALOSid:TALOS-2018-0687

Trust: 2.6

db:NVDid:CVE-2018-4016

Trust: 2.6

db:JVNDBid:JVNDB-2018-015434

Trust: 0.8

db:CNNVDid:CNNVD-201905-320

Trust: 0.7

db:VULHUBid:VHN-134047

Trust: 0.1

db:VULMONid:CVE-2018-4016

Trust: 0.1

sources: VULHUB: VHN-134047 // VULMON: CVE-2018-4016 // JVNDB: JVNDB-2018-015434 // CNNVD: CNNVD-201905-320 // NVD: CVE-2018-4016

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2018-0687

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-4016

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4016

Trust: 0.8

url:https://www.talosintelligence.com/vulnerability_reports/talos-2018-0687

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-134047 // VULMON: CVE-2018-4016 // JVNDB: JVNDB-2018-015434 // CNNVD: CNNVD-201905-320 // NVD: CVE-2018-4016

CREDITS

Discovered by Lilith ¯\_( ツ )_/¯ of Cisco Talos.,Lilith ¯\_( ツ )_/¯ of Cisco Talos.,Lilith ¯\_( ツ )_/¯ of Cisco Talos

Trust: 0.6

sources: CNNVD: CNNVD-201905-320

SOURCES

db:VULHUBid:VHN-134047
db:VULMONid:CVE-2018-4016
db:JVNDBid:JVNDB-2018-015434
db:CNNVDid:CNNVD-201905-320
db:NVDid:CVE-2018-4016

LAST UPDATE DATE

2024-11-23T22:17:00.242000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-134047date:2020-08-24T00:00:00
db:VULMONid:CVE-2018-4016date:2022-04-19T00:00:00
db:JVNDBid:JVNDB-2018-015434date:2019-06-04T00:00:00
db:CNNVDid:CNNVD-201905-320date:2022-06-08T00:00:00
db:NVDid:CVE-2018-4016date:2024-11-21T04:06:30.207

SOURCES RELEASE DATE

db:VULHUBid:VHN-134047date:2019-05-13T00:00:00
db:VULMONid:CVE-2018-4016date:2019-05-13T00:00:00
db:JVNDBid:JVNDB-2018-015434date:2019-06-04T00:00:00
db:CNNVDid:CNNVD-201905-320date:2019-05-13T00:00:00
db:NVDid:CVE-2018-4016date:2019-05-13T16:29:00.523