Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-14007: CWE-306 Missing Authentication for Critical Function in Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000

0
High
VulnerabilityCVE-2024-14007cvecve-2024-14007cwe-306
Published: Mon Nov 24 2025 (11/24/2025, 20:31:02 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen TVT Digital Technology Co., Ltd.
Product: NVMS-9000

Description

Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) versions prior to 1.3.4 contain an authentication bypass in the NVMS-9000 control protocol. By sending a single crafted TCP payload to an exposed NVMS-9000 control port, an unauthenticated remote attacker can invoke privileged administrative query commands without valid credentials. Successful exploitation discloses sensitive information including administrator usernames and passwords in cleartext, network and service configuration, and other device details via commands such as queryBasicCfg, queryUserList, queryEmailCfg, queryPPPoECfg, and queryFTPCfg.

AI-Powered Analysis

AILast updated: 11/24/2025, 20:55:31 UTC

Technical Analysis

CVE-2024-14007 is a critical authentication bypass vulnerability identified in the NVMS-9000 firmware developed by Shenzhen TVT Digital Technology Co., Ltd., commonly embedded in various white-labeled DVR, NVR, and IPC products. The flaw resides in the NVMS-9000 control protocol, where an attacker can send a single crafted TCP packet to the device's exposed control port to bypass authentication mechanisms entirely. This allows the attacker to invoke privileged administrative query commands such as queryBasicCfg, queryUserList, queryEmailCfg, queryPPPoECfg, and queryFTPCfg without any valid credentials or user interaction. Successful exploitation results in the disclosure of sensitive information including administrator usernames and passwords transmitted in cleartext, as well as detailed network and service configurations. The vulnerability affects all firmware versions prior to 1.3.4 and does not require any authentication or prior access, making it remotely exploitable over the network with low complexity. The CVSS 4.0 base score is 8.7, reflecting high impact on confidentiality and integrity, with no impact on availability. Although no known exploits are currently reported in the wild, the ease of exploitation and sensitive data exposure make this a significant threat. The vulnerability stems from CWE-306 (Missing Authentication for Critical Function), indicating a fundamental security design flaw in the device's control protocol.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the confidentiality and integrity of surveillance and security infrastructure. Exposure of administrator credentials and network configurations can lead to unauthorized access, enabling attackers to manipulate or disable security devices, intercept video feeds, or pivot to other internal systems. Organizations relying on these devices for physical security, critical infrastructure monitoring, or compliance with regulatory requirements may face operational disruptions, data breaches, and reputational damage. The cleartext transmission of sensitive credentials exacerbates the risk of credential theft and lateral movement within networks. Given the widespread use of Shenzhen TVT-based products in various sectors including government, transportation, and enterprise security across Europe, the potential impact is broad and severe. Additionally, attackers could leverage this vulnerability to establish persistent footholds or conduct espionage activities, especially in high-value targets.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls to restrict access to NVMS-9000 control ports, such as implementing firewall rules, network segmentation, and VPN access for management interfaces. Organizations should monitor network traffic for suspicious TCP payloads targeting these ports. Since no official patches are currently listed, it is critical to engage with Shenzhen TVT or device vendors for firmware updates or security advisories and apply them promptly once available. Employing strong network intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can help detect exploitation attempts. Additionally, replacing or isolating affected devices in sensitive environments should be considered if patches are delayed. Regularly auditing device configurations and changing default or exposed credentials can reduce risk. Finally, organizations should incorporate this vulnerability into their incident response plans to quickly address potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-10-22T19:13:16.930Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6924c2e2e1f3fb2621f8d208

Added to database: 11/24/2025, 8:41:06 PM

Last enriched: 11/24/2025, 8:55:31 PM

Last updated: 11/25/2025, 9:32:16 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats