CVE-2023-53879
NVClient 5.0 Stack Buffer Overflow Vulnerability via User Configuration
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition.
| CWE | CWE-121 |
| Vendor | neonguvenlik |
| Product | nvclient |
| Published | Dec 15, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for neonguvenlik nvclient
Be the first to know when new unknown vulnerabilities affecting neonguvenlik nvclient are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
Affected Versions
neonguvenlik / NVClient
5.0
References
exploit-db.com: https://www.exploit-db.com/exploits/51700 download.eyemaxdvr.com: http://download.eyemaxdvr.com/DVST%20ST%20SERIES/CMS/Video%20Surveillance%20Management%20Software(V5.0).pdf vulncheck.com: https://www.vulncheck.com/advisories/nvclient-stack-buffer-overflow-vulnerability-via-user-configuration
Credits
Ahmet Γmit BAYRAM