We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34130

LILIN DVR Arbitrary File Read via net_html.cgi



Description

An unauthenticated arbitrary file read exists in LILIN Digital Video Recorder (DVR) devices prior to firmware version 2.0b60_20200207 via the /z/zbin/net_html.cgi endpoint. This vulnerability allows attackers to read sensitive configuration files, such as /zconf/service.xml, which can then be used to facilitate further attacks including command injection. The vulnerability has been exploited in the wild in conjunction with other issues by botnets like FBot and Moobot.

Reserved 2025-04-15 | Published 2025-07-16 | Updated 2025-07-16 | Assigner VulnCheck


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-306 Missing Authentication for Critical Function

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

* before 2.0b60_20200207
affected

Credits

360 Netlab finder

References

blog.netlab.360.com/...-are-spreading-using-lilin-dvr-0-day/ third-party-advisory technical-description

www.meritlilin.com/assets/uploads/support/file/M00158-TW.pdf vendor-advisory patch

www.vulncheck.com/...ries/lilin-dvr-multiple-vulnerabilities third-party-advisory

cve.org (CVE-2025-34130)

nvd.nist.gov (CVE-2025-34130)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34130

Support options

Helpdesk Chat, Email, Knowledgebase