We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-31700



Description

A vulnerability has been found in Dahua products. Attackers could exploit a buffer overflow vulnerability by sending specially crafted malicious packets, potentially causing service disruption (e.g., crashes) or remote code execution (RCE). Some devices may have deployed protection mechanisms such as Address Space Layout Randomization (ASLR), which reduces the likelihood of successful RCE exploitation. However, denial-of-service (DoS) attacks remain a concern.

Reserved 2025-04-01 | Published 2025-07-23 | Updated 2025-07-23 | Assigner dahua


HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

Affected products include certain models from the IPC-1XXX, IPC-2XXX, IPC-WX, and IPC-ECXX series, and limited to versions which build time before April 16, 2025.
affected

Default status
unaffected

Affected products include certain models from the SD3A, SD2A, SD3D, SDT2A, and SD2C series, and limited to versions which build time before April 16, 2025.
affected

References

www.dahuasecurity.com/aboutUs/trustedCenter/details/775

cve.org (CVE-2025-31700)

nvd.nist.gov (CVE-2025-31700)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-31700

Support options

Helpdesk Chat, Email, Knowledgebase