{"uuid": "ce98e97e-bef1-4f3f-9c3a-102929466526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50694", "type": "seen", "source": "https://t.me/cvedetector/16349", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50694 - SunGrow WiNet-SV200 MQTT Stack-Based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-50694 \nPublished : Jan. 24, 2025, 11:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when copying the timestamp read from an MQTT message, the underlying code does not check the bounds of the buffer that is used to store the message. This may lead to a stack-based buffer overflow. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-25T02:07:06.000000Z"}