Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits
Dahua智能摄像头固件被发现存在严重安全漏洞(CVE-2025-31700和CVE-2025-31701),已修复。这些漏洞影响ONVIF协议和文件上传处理程序,允许未认证攻击者远程执行任意命令并接管设备。受影响设备包括多个系列(如IPC-1XXX、SD3A等),版本时间戳早于2025年4月16日。漏洞可能导致拒绝服务或远程代码执行风险,暴露于互联网的设备尤其危险。 2025-7-30 13:1:0 Author: thehackernews.com(查看原文) 阅读量:24 收藏

Firmware Security / Vulnerability

Critical Dahua Camera Flaws

Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left unaddressed, could allow attackers to hijack control of susceptible devices.

"The flaws, affecting the device's ONVIF protocol and file upload handlers, allow unauthenticated attackers to execute arbitrary commands remotely, effectively taking over the device," Bitdefender said in a report shared with The Hacker News.

The vulnerabilities, tracked as CVE-2025-31700 and CVE-2025-31701 (CVSS scores: 8.1), affect the following devices running versions with built timestamps before April 16, 2025 -

  • IPC-1XXX Series
  • IPC-2XXX Series
  • IPC-WX Series
  • IPC-ECXX Series
  • SD3A Series
  • SD2A Series
  • SD3D Series
  • SDT2A Series
  • SD2C Series
Cybersecurity

It's worth noting that users can view the build time by logging in to the web interface of the device and then navigating to Settings -> System Information -> Version.

Both shortcomings are classified as buffer overflow vulnerabilities that could be exploited by sending specially crafted malicious packets, resulting in denial-of-service or remote code execution (RCE).

Specifically, CVE-2025-31700 has been described as a stack-based buffer overflow in the Open Network Video Interface Forum (ONVIF) request handler, while CVE-2025-31701 concerns an overflow bug in the RPC file upload handler.

"Some devices may have deployed protection mechanisms such as Address Space Layout Randomization (ASLR), which reduces the likelihood of successful RCE exploitation," Dahua said in an alert released last week. "However, denial-of-service (DoS) attacks remain a concern."

Given that these models are used for video surveillance in retail, casinos, warehouses, and residential settings, the flaws can have significant consequences as they are unauthenticated and exploitable over the local network.

"Devices exposed to the internet through port forwarding or UPnP are especially at risk," the Romanian cybersecurity company said. "Successful exploitation provides root-level access to the camera with no user interaction. Because the exploit path bypasses firmware integrity checks, attackers can load unsigned payloads or persist via custom daemons, making cleanup difficult."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/07/critical-dahua-camera-flaws-enable.html
如有侵权请联系:admin#unsafe.sh