Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58336: Missing Authentication for Critical Function in The Akuvox Company Akuvox Smart Doorphone

0
High
VulnerabilityCVE-2024-58336cvecve-2024-58336
Published: Tue Dec 30 2025 (12/30/2025, 22:41:44 UTC)
Source: CVE Database V5
Vendor/Project: The Akuvox Company
Product: Akuvox Smart Doorphone

Description

Akuvox Smart Intercom S539 contains an unauthenticated vulnerability that allows remote attackers to access live video streams by requesting the video.cgi endpoint on port 8080. Attackers can retrieve video stream data without authentication by directly accessing the specified endpoint on affected Akuvox doorphone and intercom devices.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:23:27 UTC

Technical Analysis

CVE-2024-58336 is a vulnerability identified in Akuvox Smart Doorphone devices, specifically models S539, S532, X916, X915, and X912. The issue arises from a missing authentication mechanism on the video.cgi endpoint, which listens on port 8080. This endpoint streams live video feeds from the device's camera. Due to the lack of authentication, any remote attacker with network access to the device can request this endpoint and retrieve live video streams without needing credentials or user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality heavily (VC:H) while not affecting integrity or availability. This means attackers can spy on live video feeds, potentially capturing sensitive information about premises and occupants. The vulnerability does not require any complex attack vectors or social engineering, making it straightforward to exploit if the device is exposed to untrusted networks. Akuvox devices are commonly used in commercial and residential buildings for intercom and access control, meaning the exposure of live video streams can lead to privacy violations, corporate espionage, or physical security risks. Although no public exploits are currently known, the high CVSS score of 8.7 reflects the critical nature of the flaw. The lack of available patches at the time of publication necessitates immediate compensating controls to reduce exposure.

Potential Impact

For European organizations, the impact of CVE-2024-58336 is significant. Unauthorized access to live video streams can lead to severe privacy breaches, exposing sensitive information about building occupants, security protocols, and physical layouts. This can facilitate targeted physical intrusions, espionage, or harassment. Organizations relying on Akuvox devices for secure communication and access control may find their security posture severely weakened. Critical infrastructure facilities, government buildings, corporate offices, and residential complexes using these devices are at risk. The breach of confidentiality can also result in regulatory non-compliance under GDPR, leading to legal and financial repercussions. The ease of exploitation means attackers can operate remotely without detection, increasing the likelihood of successful attacks. The reputational damage from such privacy violations can be substantial, especially for organizations handling sensitive or classified information.

Mitigation Recommendations

1. Immediately restrict network access to Akuvox devices by implementing firewall rules that limit access to trusted internal IP ranges only, blocking all external or untrusted network traffic to port 8080. 2. Segment the network to isolate IoT and smart device traffic from critical business systems and sensitive data environments. 3. Monitor network traffic and device logs for unusual or unauthorized access attempts to the video.cgi endpoint. 4. Engage with Akuvox or authorized vendors to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 5. If firmware updates are not yet available, consider disabling or blocking the video streaming service on the device if possible. 6. Conduct regular security assessments of all smart building devices to identify and remediate similar vulnerabilities proactively. 7. Educate facility management and IT teams about the risks of exposed IoT devices and enforce strict device configuration and access policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-26T17:10:59.893Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954592edb813ff03e38557d

Added to database: 12/30/2025, 10:58:54 PM

Last enriched: 1/17/2026, 7:23:27 AM

Last updated: 2/7/2026, 2:40:57 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats