Description
A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). This allows remote takeover of a Furbo Dog Camera, for example. NOTE: The vendor states that the RTSP library is used for DEMO only, using it in product is a customer's behavior. Ambarella has emphasized that RTSP is DEMO only library, should NOT be used in product in our document. Because Ambarella's SDK is proprietary, we didn't publish our SDK source code in public network.
References (4)
Core 4
Core References
Exploit, Third Party Advisory
https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1
Vendor Advisory
https://www.ambarella.com
Exploit, Third Party Advisory
https://www.somersetrecon.com/blog
Scores
CVSS v3
9.8
EPSS
0.1303
EPSS Percentile
94.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-120
Status
published
Products (1)
ambarella/oryx_rtsp_server
2020-01-07
Published
Apr 30, 2021
Tracked Since
Feb 18, 2026