Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12592: CWE-1392 CWE-1392: Use of Default Credentials in Vivotek Affected device model numbers are FD7131-VVTK,FD7131-VVTK,FD7131-VVTK,FD7141-VVTK,IP7131-VVTK,IP7133-VVTK,IP7133-VVTK,IP7133-VVTK,IP7134-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7138-VVTK,IP7142-VVTK,IP7142-VVTK,IP7151-VVTK,IP7152-VVTK,IP7153-VVTK,IP7153-VVTK,IP7154-VVTK,IP7330-VVTK,IP7330-VVTK,IP7330-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131W-VVTK,PT7135-VVTK,PT7137-TCON,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PZ7131-VVTK,PZ7131-VVTK,PZ71X1-VVTK,PZ71X1-VVTK,PZ71X2-VVTK,SD73X3-VVTK,SD73X3-VVTK,SD73X3-VVTK,TC5330-VVTK,TC5332-TCVV,TC5333-TCVV,TC5633-TCVV,TC5633-VVTK,VS7100-VVTK,VS7100-VVTK,VS7100-VVTK

0
Critical
VulnerabilityCVE-2025-12592cvecve-2025-12592cwe-1392
Published: Wed Nov 19 2025 (11/19/2025, 12:30:32 UTC)
Source: CVE Database V5
Vendor/Project: Vivotek
Product: Affected device model numbers are FD7131-VVTK,FD7131-VVTK,FD7131-VVTK,FD7141-VVTK,IP7131-VVTK,IP7133-VVTK,IP7133-VVTK,IP7133-VVTK,IP7134-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7138-VVTK,IP7142-VVTK,IP7142-VVTK,IP7151-VVTK,IP7152-VVTK,IP7153-VVTK,IP7153-VVTK,IP7154-VVTK,IP7330-VVTK,IP7330-VVTK,IP7330-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131W-VVTK,PT7135-VVTK,PT7137-TCON,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PZ7131-VVTK,PZ7131-VVTK,PZ71X1-VVTK,PZ71X1-VVTK,PZ71X2-VVTK,SD73X3-VVTK,SD73X3-VVTK,SD73X3-VVTK,TC5330-VVTK,TC5332-TCVV,TC5333-TCVV,TC5633-TCVV,TC5633-VVTK,VS7100-VVTK,VS7100-VVTK,VS7100-VVTK

Description

Legacy Vivotek Device firmware uses default credetials for the root and user login accounts.

AI-Powered Analysis

AILast updated: 11/19/2025, 13:06:50 UTC

Technical Analysis

CVE-2025-12592 is a critical security vulnerability identified in legacy firmware versions of numerous Vivotek IP camera models, including but not limited to FD7131-VVTK, IP7133-VVTK, IP7153-VVTK, and VS7100-VVTK series. The root cause is the use of default credentials for both root and user login accounts embedded in the device firmware. These default credentials are well-known or easily guessable, allowing unauthenticated attackers to remotely access the device management interfaces over the network. The vulnerability requires no privileges or user interaction, making exploitation straightforward. Attackers can gain full administrative control, compromising confidentiality, integrity, and availability of the device and potentially the wider network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/AU:Y/U:Red) reflects a network attack vector with low attack complexity, no authentication, and high impact on all security properties. The affected firmware versions range from early releases (0100b) through multiple incremental updates (up to 0500b), indicating a long-standing issue in legacy devices. Although no public exploits are currently reported, the vulnerability's nature and criticality suggest it is a high-value target for attackers. The vulnerability is cataloged under CWE-1392, which relates to the use of default credentials, a common but severe security flaw in embedded devices. The lack of available patches or updates in the provided data emphasizes the need for alternative mitigations. Given the widespread deployment of Vivotek cameras in enterprise and critical infrastructure environments, this vulnerability poses a significant threat to security and privacy.

Potential Impact

For European organizations, the impact of CVE-2025-12592 is substantial. Vivotek IP cameras are commonly used in corporate, governmental, and critical infrastructure sectors for surveillance and security monitoring. Exploitation can lead to unauthorized access to live video feeds, compromising privacy and potentially exposing sensitive operational details. Attackers gaining root access can manipulate device configurations, disable security features, or use the compromised devices as pivot points for lateral movement within internal networks. This can result in data breaches, espionage, disruption of security operations, and damage to organizational reputation. The availability of these devices for remote exploitation without authentication increases the risk of widespread attacks, especially in environments where network segmentation and device hardening are insufficient. Additionally, compromised cameras can be conscripted into botnets for distributed denial-of-service (DDoS) attacks, further impacting organizational network availability. The critical nature of this vulnerability necessitates urgent attention to prevent exploitation and mitigate potential operational and regulatory consequences, including GDPR compliance issues related to unauthorized access to personal data captured by surveillance devices.

Mitigation Recommendations

1. Immediate change of all default credentials on affected Vivotek devices to strong, unique passwords is essential. 2. Verify with Vivotek or authorized vendors for firmware updates or patches addressing this vulnerability; apply them promptly if available. 3. If firmware updates are not available, consider device replacement or isolation from critical network segments. 4. Implement strict network segmentation to isolate IP cameras from sensitive internal networks, restricting access to management interfaces to trusted administrators only. 5. Deploy network-level access controls such as firewalls and VLANs to limit exposure of camera devices to the internet or untrusted networks. 6. Enable and monitor device logs and network traffic for unusual login attempts or unauthorized access patterns. 7. Use multi-factor authentication (MFA) where supported to enhance login security. 8. Conduct regular security audits and vulnerability assessments focusing on IoT and surveillance devices. 9. Educate security teams and administrators about the risks of default credentials and enforce policies to prevent their use. 10. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting Vivotek devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
larry_cashdollar
Date Reserved
2025-11-01T12:15:08.915Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691dbe8df37b5c9bf1714e87

Added to database: 11/19/2025, 12:56:45 PM

Last enriched: 11/19/2025, 1:06:50 PM

Last updated: 11/19/2025, 2:32:54 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats