We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34042

Beward N100 IP Camera Remote Command Execution



Description

An authenticated command injection vulnerability exists in the Beward N100 IP Camera firmware version M2.1.6.04C014 via the ServerName and TimeZone parameters in the servetest CGI page. An attacker with access to the web interface can inject arbitrary system commands into these parameters, which are unsafely embedded into backend system calls without proper input sanitization. Successful exploitation results in remote code execution with root privileges.

Reserved 2025-04-15 | Published 2025-06-26 | Updated 2025-06-26 | Assigner VulnCheck


CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-20 Improper Input Validation

Product status

Default status
unaffected

M2.1.6.04C014
affected

Credits

Gjoko Krstic of Zero Science finder

References

www.beward.net product

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5512.php third-party-advisory exploit

www.fortiguard.com/encyclopedia/ips/48618 third-party-advisory

s4e.io/...-n100-h264-vga-ip-camera-arbitrary-file-disclosure third-party-advisory technical-description

packetstorm.news/files/id/151531 exploit

cxsecurity.com/issue/WLB-2019020042 exploit

vulncheck.com/...sories/beward-n100-remote-command-execution third-party-advisory

cve.org (CVE-2025-34042)

nvd.nist.gov (CVE-2025-34042)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34042

Support options

Helpdesk Chat, Email, Knowledgebase