CVE-2020-36885
Published: 10 December 2025
Description
Sony IPELA Network Camera 1.82.01 contains a stack buffer overflow vulnerability in the ftpclient.cgi endpoint that allows remote attackers to execute arbitrary code. Attackers can exploit the vulnerability by sending a crafted POST request with oversized data to the FTP…
more
client functionality, potentially causing remote code execution or denial of service.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents stack buffer overflows by validating the size and format of POST requests to the ftpclient.cgi endpoint before processing oversized data.
Implements memory protections like stack canaries, ASLR, and DEP to block arbitrary code execution even if a buffer overflow occurs in ftpclient.cgi.
Mandates timely remediation of the specific stack buffer overflow flaw through Sony firmware updates, eliminating the vulnerability.
Security SummaryAI
CVE-2020-36885 is a stack buffer overflow vulnerability (CWE-787) affecting Sony IPELA Network Camera version 1.82.01, specifically in the ftpclient.cgi endpoint. The flaw arises when the FTP client functionality processes a crafted POST request containing oversized data, leading to a buffer overflow. This critical issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts.
Remote attackers can exploit this vulnerability without authentication or user interaction by sending a specially crafted POST request over the network to the vulnerable endpoint. Successful exploitation enables arbitrary code execution on the device or denial of service, potentially compromising the camera's functionality and allowing attackers to gain control over the affected network camera.
Advisories and references include Sony support resources for the SNC-DH120 model, such as firmware update software (mpengb00000928), a public exploit on Exploit-DB (48842), and detailed analyses from VulnCheck and Zero Science Labs (ZSL-2020-5596), which likely outline patches or mitigation steps available through Sony's updates.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remotely exploitable stack buffer overflow in a public-facing CGI endpoint (ftpclient.cgi) on a network camera, enabling unauthenticated arbitrary code execution, directly mapping to Exploit Public-Facing Application (T1190).