CVE-2025-14746: Improper Authentication in Ningyuanda TC155
A vulnerability has been found in Ningyuanda TC155 57.0.2.0. The affected element is an unknown function of the component RTSP Live Video Stream Endpoint. Such manipulation leads to improper authentication. The attack must be carried out from within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14746 is a vulnerability discovered in the Ningyuanda TC155 device, version 57.0.2.0, specifically within the RTSP Live Video Stream Endpoint component. The flaw results in improper authentication, allowing an attacker to bypass authentication mechanisms without requiring privileges or user interaction. The exact function affected is unspecified, but the vulnerability enables unauthorized access to the device's video streaming functionality. Exploitation requires the attacker to be on the same local network as the device, limiting the attack vector to internal threat actors or compromised internal hosts. The CVSS 4.0 score of 5.3 reflects a medium severity, with the attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial confidentiality impact (VC:L). The vendor has not responded to the disclosure, and no patches or mitigations have been published. No known exploits are currently active in the wild, but public disclosure increases the risk of exploitation attempts. This vulnerability could allow unauthorized users to access live video streams, potentially leading to privacy violations, unauthorized surveillance, or information leakage. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. Given the nature of the device (likely used in surveillance or monitoring), unauthorized access could have operational and security implications, especially in sensitive environments.
Potential Impact
For European organizations, the improper authentication vulnerability in Ningyuanda TC155 devices could lead to unauthorized access to live video streams, compromising confidentiality and potentially exposing sensitive surveillance data. This could affect sectors such as critical infrastructure, transportation, public safety, and private enterprises relying on these devices for security monitoring. The requirement for local network access limits remote exploitation but raises concerns about insider threats or lateral movement within compromised networks. Unauthorized access could also facilitate further attacks by providing attackers with reconnaissance or real-time monitoring capabilities. The absence of vendor patches increases the risk window, forcing organizations to rely on network-level mitigations. Privacy regulations in Europe, such as GDPR, could impose legal and financial consequences if video data is exposed due to this vulnerability. Additionally, organizations with interconnected IoT or surveillance ecosystems may face cascading risks if attackers leverage this flaw to pivot to other systems.
Mitigation Recommendations
1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user networks, restricting access only to trusted management and monitoring hosts. 2. Employ access control lists (ACLs) and firewall rules to limit RTSP protocol traffic to authorized devices and users within the local network. 3. Continuously monitor network traffic for unusual RTSP connection attempts or unauthorized access patterns using intrusion detection systems (IDS) or network behavior anomaly detection tools. 4. Disable or restrict RTSP streaming services on devices where live video streaming is not essential. 5. Enforce strong physical security controls to prevent unauthorized local network access. 6. Maintain an inventory of all Ningyuanda TC155 devices and track firmware versions to identify affected units. 7. Engage with the vendor or community for updates or unofficial patches and apply them promptly once available. 8. Consider deploying compensating controls such as VPNs or encrypted tunnels for accessing device streams internally. 9. Educate internal staff about the risks of local network threats and enforce least privilege principles. 10. Prepare incident response plans specific to unauthorized access to video surveillance systems.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-14746: Improper Authentication in Ningyuanda TC155
Description
A vulnerability has been found in Ningyuanda TC155 57.0.2.0. The affected element is an unknown function of the component RTSP Live Video Stream Endpoint. Such manipulation leads to improper authentication. The attack must be carried out from within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14746 is a vulnerability discovered in the Ningyuanda TC155 device, version 57.0.2.0, specifically within the RTSP Live Video Stream Endpoint component. The flaw results in improper authentication, allowing an attacker to bypass authentication mechanisms without requiring privileges or user interaction. The exact function affected is unspecified, but the vulnerability enables unauthorized access to the device's video streaming functionality. Exploitation requires the attacker to be on the same local network as the device, limiting the attack vector to internal threat actors or compromised internal hosts. The CVSS 4.0 score of 5.3 reflects a medium severity, with the attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial confidentiality impact (VC:L). The vendor has not responded to the disclosure, and no patches or mitigations have been published. No known exploits are currently active in the wild, but public disclosure increases the risk of exploitation attempts. This vulnerability could allow unauthorized users to access live video streams, potentially leading to privacy violations, unauthorized surveillance, or information leakage. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. Given the nature of the device (likely used in surveillance or monitoring), unauthorized access could have operational and security implications, especially in sensitive environments.
Potential Impact
For European organizations, the improper authentication vulnerability in Ningyuanda TC155 devices could lead to unauthorized access to live video streams, compromising confidentiality and potentially exposing sensitive surveillance data. This could affect sectors such as critical infrastructure, transportation, public safety, and private enterprises relying on these devices for security monitoring. The requirement for local network access limits remote exploitation but raises concerns about insider threats or lateral movement within compromised networks. Unauthorized access could also facilitate further attacks by providing attackers with reconnaissance or real-time monitoring capabilities. The absence of vendor patches increases the risk window, forcing organizations to rely on network-level mitigations. Privacy regulations in Europe, such as GDPR, could impose legal and financial consequences if video data is exposed due to this vulnerability. Additionally, organizations with interconnected IoT or surveillance ecosystems may face cascading risks if attackers leverage this flaw to pivot to other systems.
Mitigation Recommendations
1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user networks, restricting access only to trusted management and monitoring hosts. 2. Employ access control lists (ACLs) and firewall rules to limit RTSP protocol traffic to authorized devices and users within the local network. 3. Continuously monitor network traffic for unusual RTSP connection attempts or unauthorized access patterns using intrusion detection systems (IDS) or network behavior anomaly detection tools. 4. Disable or restrict RTSP streaming services on devices where live video streaming is not essential. 5. Enforce strong physical security controls to prevent unauthorized local network access. 6. Maintain an inventory of all Ningyuanda TC155 devices and track firmware versions to identify affected units. 7. Engage with the vendor or community for updates or unofficial patches and apply them promptly once available. 8. Consider deploying compensating controls such as VPNs or encrypted tunnels for accessing device streams internally. 9. Educate internal staff about the risks of local network threats and enforce least privilege principles. 10. Prepare incident response plans specific to unauthorized access to video surveillance systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-15T20:39:05.047Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6940c7c9d9bcdf3f3d1a980a
Added to database: 12/16/2025, 2:45:29 AM
Last enriched: 12/16/2025, 3:01:45 AM
Last updated: 12/18/2025, 12:46:50 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumCVE-2025-14834: SQL Injection in code-projects Simple Stock System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.