We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-7503



Description

An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation.

Reserved 2025-07-11 | Published 2025-07-11 | Updated 2025-07-11 | Assigner Toreon


CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Red

Problem types

CWE-798: Use of Hard-coded Credentials

Product status

Default status
unaffected

1.0.6.0
affected

Credits

Aoun Shah finder

References

github.com/AounShAh/Research-on-v380-cctv-ip-camera

cve.org (CVE-2025-7503)

nvd.nist.gov (CVE-2025-7503)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-7503

Support options

Helpdesk Chat, Email, Knowledgebase