πŸ” CVE Alert

CVE-2023-53879

UNKNOWN 0.0

NVClient 5.0 Stack Buffer Overflow Vulnerability via User Configuration

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field that allows attackers to crash the application. Attackers can overwrite 846 bytes of memory by pasting a crafted payload into the contact box, causing a denial of service condition.

CWE CWE-121
Vendor neonguvenlik
Product nvclient
Published Dec 15, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for neonguvenlik nvclient

Be the first to know when new unknown vulnerabilities affecting neonguvenlik nvclient are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

Affected Versions

neonguvenlik / NVClient
5.0

References

NVD β†— CVE.org β†— EPSS Data β†—
exploit-db.com: https://www.exploit-db.com/exploits/51700 download.eyemaxdvr.com: http://download.eyemaxdvr.com/DVST%20ST%20SERIES/CMS/Video%20Surveillance%20Management%20Software(V5.0).pdf vulncheck.com: https://www.vulncheck.com/advisories/nvclient-stack-buffer-overflow-vulnerability-via-user-configuration

Credits

Ahmet Ümit BAYRAM