Browse all 5 CVE security advisories affecting Lorex. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Lorex specializes in security-focused video surveillance systems for residential and commercial use. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from inadequate input validation and authentication flaws. While no major public security incidents have been widely documented, the five CVEs on record highlight persistent security concerns in their web interfaces and mobile applications. These vulnerabilities typically allow unauthorized access or device control, emphasizing the need for regular firmware updates and network segmentation for deployed systems.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-52548 | Lorex 2K Indoor Wi-Fi Security Camera - Code signing bypass — 2K Indoor Wi-Fi Security CameraCWE-345 | 6.7 | Medium | 2024-12-03 |
| CVE-2024-52547 | Lorex 2K Indoor Wi-Fi Security Camera - Stack buffer overflow — 2K Indoor Wi-Fi Security CameraCWE-121 | 7.2 | High | 2024-12-03 |
| CVE-2024-52546 | Lorex 2K Indoor Wi-Fi Security Camera - Null pointer dereference — 2K Indoor Wi-Fi Security CameraCWE-476 | 5.3 | Medium | 2024-12-03 |
| CVE-2024-52545 | Lorex 2K Indoor Wi-Fi Security Camera - Out of bounds heap read — 2K Indoor Wi-Fi Security CameraCWE-125 | 6.5 | Medium | 2024-12-03 |
| CVE-2024-52544 | Lorex 2K Indoor Wi-Fi Security Camera - Stack buffer overflow — 2K Indoor Wi-Fi Security CameraCWE-121 | 9.8 | Critical | 2024-12-03 |
This page lists every published CVE security advisory associated with Lorex. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.