tip EZVIZ no longer supports Internet Explorer 10 or earlier versions, and the site may not behave as expected. Please upgrade to a newer browser.
Wybierz kraj lub region, aby wyświetlić treści dostosowane do Twojej lokalizacji i potrzeb. Przekierujemy Cię na Twoją lokalną stronę.

Notice about Vulnerability in EZVIZ Studio

Notice Released By: EZVIZ Security Team

Initial Release Date: 2024/1/26


Vulnerability & Affected Versions: 

The EZVIZ Studio software (Windows) has been affected by a buffer overflow based Structured Exception Handler (SEH), which could be leveraged to execute arbitrary code with local administrator rights (CVE-2023-50613).


Affected ModelsAffected Versions
EZVIZ Studio software (Windows)prior to 2.2.1


Scoring: 

CVSS v3.1 is adopted in this vulnerability scoring. (http://www.first.org/cvss/specification-document)

Base score: 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)


Fix Progress: 

The related vulnerability has been fixed and the updated version has been released on https://support.ezviz.com/download. Users with an affected version can completely fix the vulnerability by upgrading their EZVIZ Studio software.


Completing Upgrade:

The EZVIZ Studio will automatically detect the new version and upgrade accordingly, if it is permitted by the system settings selected by the user.
Users can also download the latest version from https://support.ezviz.com/download to complete the upgrade manually.


Source of Vulnerability Information:

The vulnerability was reported to EZVIZ Security Team by ethical hacker KARATEKIN Mickael (@sysdream.com)


Contact Us:

If you believe you have discovered a security vulnerability, please report it to EZVIZ at security@ezviz.com, or join our bounty program on YesWeHack. Our security team will be in touch if we need more information.


EZVIZ would like to thank all security researchers and professionals who help test, identify and mitigate potential vulnerabilities in EZVIZ products, ensuring that we continue to respectfully protect people and homes, while securing devices and data.


This website uses cookies to store info on your device. Cookies help our website work normally and show us how we can improve your user experience.
By continuing to browse the site you are agreeing to our cookie policy and privacy policy.

We have updated our Privacy Policy. Please read it carefully.

We provide you with customized service and safe user experience with Cookie. Login and browse our website indicates that you permitted us getting information in/out the website with Cookie. Please visit Use of Cookies