Home

Description

Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) versions prior to 1.3.4 contain an authentication bypass in the NVMS-9000 control protocol. By sending a single crafted TCP payload to an exposed NVMS-9000 control port, an unauthenticated remote attacker can invoke privileged administrative query commands without valid credentials. Successful exploitation discloses sensitive information including administrator usernames and passwords in cleartext, network and service configuration, and other device details via commands such as queryBasicCfg, queryUserList, queryEmailCfg, queryPPPoECfg, and queryFTPCfg.

PUBLISHED Reserved 2025-10-22 | Published 2025-11-24 | Updated 2025-11-25 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

Any version before 1.3.4
affected

Timeline

2024-04-24:Vulnerability is publicly disclosed

Credits

SSD Secure Disclosure coordinator

References

ssd-disclosure.com/...isory-nvms9000-information-disclosure/ technical-description exploit

www.greynoise.io/blog/surge-exploitation-attempts-tvt-dvrs related

undercodetesting.com/...variant-targeting-nvms-9000-devices/ related

www.vulncheck.com/...dmin-queries-and-information-disclosure third-party-advisory

cve.org (CVE-2024-14007)

nvd.nist.gov (CVE-2024-14007)

Download JSON