Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-14007: CWE-306 Missing Authentication for Critical Function in Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000

0
High
VulnerabilityCVE-2024-14007cvecve-2024-14007cwe-306
Published: Mon Nov 24 2025 (11/24/2025, 20:31:02 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen TVT Digital Technology Co., Ltd.
Product: NVMS-9000

Description

Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) versions prior to 1.3.4 contain an authentication bypass in the NVMS-9000 control protocol. By sending a single crafted TCP payload to an exposed NVMS-9000 control port, an unauthenticated remote attacker can invoke privileged administrative query commands without valid credentials. Successful exploitation discloses sensitive information including administrator usernames and passwords in cleartext, network and service configuration, and other device details via commands such as queryBasicCfg, queryUserList, queryEmailCfg, queryPPPoECfg, and queryFTPCfg.

AI-Powered Analysis

AILast updated: 12/01/2025, 21:38:35 UTC

Technical Analysis

CVE-2024-14007 identifies a critical authentication bypass vulnerability in the NVMS-9000 firmware developed by Shenzhen TVT Digital Technology Co., Ltd., which is embedded in numerous white-labeled DVR, NVR, and IPC products globally. The flaw resides in the NVMS-9000 control protocol, where the firmware fails to enforce authentication for critical administrative query commands. By sending a single specially crafted TCP payload to the exposed NVMS-9000 control port, an unauthenticated remote attacker can invoke privileged commands such as queryBasicCfg, queryUserList, queryEmailCfg, queryPPPoECfg, and queryFTPCfg. These commands disclose sensitive information including administrator usernames and passwords transmitted in cleartext, network configurations, email settings, PPPoE configurations, and FTP settings. The vulnerability affects all firmware versions prior to 1.3.4. The CVSS 4.0 base score is 8.7 (high severity), reflecting the vulnerability's network attack vector, low attack complexity, no required privileges or user interaction, and high impact on confidentiality. No known exploits have been reported in the wild yet, but the vulnerability's nature allows straightforward exploitation. The exposure of administrative credentials and device configurations can facilitate further attacks such as device takeover, lateral movement, or persistent surveillance compromise. This vulnerability is particularly concerning for environments relying on these devices for security monitoring and critical infrastructure protection.

Potential Impact

For European organizations, the impact of CVE-2024-14007 is significant due to the widespread use of Shenzhen TVT's white-labeled DVR, NVR, and IPC devices in surveillance and security systems. Confidentiality is severely compromised as attackers can retrieve administrator credentials and sensitive configuration data, enabling unauthorized access and control over surveillance infrastructure. This can lead to unauthorized surveillance, data leakage, and potential manipulation or disruption of security monitoring. Integrity and availability risks arise if attackers leverage the disclosed credentials to alter device configurations or disrupt services. Critical sectors such as transportation, government facilities, utilities, and corporate campuses that rely on these devices for physical security are at heightened risk. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of attacks, potentially leading to large-scale breaches or espionage. Additionally, exposure of network and service configurations can facilitate further network intrusions or lateral movement within organizational networks. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Immediate firmware upgrade to version 1.3.4 or later, which addresses the authentication bypass vulnerability. 2. Restrict network access to NVMS-9000 control ports by implementing network segmentation and firewall rules to limit exposure only to trusted management networks. 3. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious TCP payloads targeting NVMS-9000 control ports. 4. Conduct thorough audits of all deployed Shenzhen TVT and white-labeled devices to identify vulnerable firmware versions. 5. Change all default and known administrator credentials on affected devices to strong, unique passwords. 6. Disable unused services and protocols on the devices to reduce the attack surface. 7. Implement strict access control policies and monitor device logs for unusual administrative command queries. 8. Coordinate with vendors and suppliers to ensure timely patch deployment and receive security advisories. 9. For critical infrastructure, consider deploying additional layers of physical and network security to mitigate potential device compromise consequences.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-10-22T19:13:16.930Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6924c2e2e1f3fb2621f8d208

Added to database: 11/24/2025, 8:41:06 PM

Last enriched: 12/1/2025, 9:38:35 PM

Last updated: 1/10/2026, 10:11:22 PM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats