CVE-2025-14747: Denial of Service in Ningyuanda TC155
A vulnerability was found in Ningyuanda TC155 57.0.2.0. The impacted element is an unknown function of the component RTSP Service. Performing manipulation results in denial of service. The attack must originate from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14747 is a denial of service vulnerability identified in the RTSP Service component of Ningyuanda TC155 firmware version 57.0.2.0. The vulnerability arises from an unspecified function within the RTSP service that, when manipulated by an attacker on the same local network, can cause the device or service to crash or become unresponsive, effectively resulting in a denial of service condition. The attack vector requires local network access, meaning the attacker must be on the same subnet or have network-level access to the device. No privileges, authentication, or user interaction are necessary to exploit this vulnerability, which increases its risk within trusted internal networks. The CVSS 4.0 base score is 5.3, reflecting a medium severity level primarily due to the limited attack vector (local network) and the impact being restricted to availability. The vendor Ningyuanda has not issued any patches or responded to disclosure attempts, leaving affected devices exposed. The exploit details have been made public, increasing the likelihood of potential exploitation, although no active exploitation has been reported to date. The vulnerability could disrupt services relying on the RTSP protocol, commonly used for streaming video and audio, impacting surveillance, monitoring, or communication systems that utilize the TC155 device. Since the affected function is unknown, detailed technical mitigation is challenging, but network-level controls and monitoring are critical.
Potential Impact
For European organizations, the primary impact of CVE-2025-14747 is the potential disruption of services relying on Ningyuanda TC155 devices, particularly those using RTSP streaming for surveillance, security monitoring, or communication. Denial of service conditions could lead to temporary loss of video feeds or interruption of critical monitoring systems, affecting operational continuity and situational awareness. This may have downstream effects on physical security, safety monitoring, and compliance with regulatory requirements for surveillance in sectors such as transportation, utilities, and public safety. The requirement for local network access limits remote exploitation risk but increases the importance of internal network security and segmentation. Organizations with large deployments of Ningyuanda TC155 devices or those in critical infrastructure sectors are at higher risk. The lack of vendor response and patches prolongs exposure, necessitating proactive mitigation. Additionally, public disclosure of the exploit code increases the risk of opportunistic attacks by insiders or lateral movement attackers within compromised networks.
Mitigation Recommendations
1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user networks, limiting local network access to trusted administrators and systems only. 2. Monitor RTSP traffic for unusual patterns or malformed requests that could indicate exploitation attempts. 3. Employ network access control (NAC) solutions to restrict which devices can communicate with the TC155 units. 4. Use firewall rules to limit RTSP service access to known IP addresses and subnets. 5. Regularly audit and update internal network security policies to reduce the risk of unauthorized local network access. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalies in RTSP traffic. 7. Maintain an inventory of all Ningyuanda TC155 devices and track firmware versions to identify affected units. 8. Engage with Ningyuanda or third-party security providers for potential unofficial patches or workarounds. 9. Prepare incident response plans for denial of service events affecting RTSP services to minimize operational impact. 10. Educate internal staff about the risk of local network threats and enforce strong physical and logical access controls.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-14747: Denial of Service in Ningyuanda TC155
Description
A vulnerability was found in Ningyuanda TC155 57.0.2.0. The impacted element is an unknown function of the component RTSP Service. Performing manipulation results in denial of service. The attack must originate from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14747 is a denial of service vulnerability identified in the RTSP Service component of Ningyuanda TC155 firmware version 57.0.2.0. The vulnerability arises from an unspecified function within the RTSP service that, when manipulated by an attacker on the same local network, can cause the device or service to crash or become unresponsive, effectively resulting in a denial of service condition. The attack vector requires local network access, meaning the attacker must be on the same subnet or have network-level access to the device. No privileges, authentication, or user interaction are necessary to exploit this vulnerability, which increases its risk within trusted internal networks. The CVSS 4.0 base score is 5.3, reflecting a medium severity level primarily due to the limited attack vector (local network) and the impact being restricted to availability. The vendor Ningyuanda has not issued any patches or responded to disclosure attempts, leaving affected devices exposed. The exploit details have been made public, increasing the likelihood of potential exploitation, although no active exploitation has been reported to date. The vulnerability could disrupt services relying on the RTSP protocol, commonly used for streaming video and audio, impacting surveillance, monitoring, or communication systems that utilize the TC155 device. Since the affected function is unknown, detailed technical mitigation is challenging, but network-level controls and monitoring are critical.
Potential Impact
For European organizations, the primary impact of CVE-2025-14747 is the potential disruption of services relying on Ningyuanda TC155 devices, particularly those using RTSP streaming for surveillance, security monitoring, or communication. Denial of service conditions could lead to temporary loss of video feeds or interruption of critical monitoring systems, affecting operational continuity and situational awareness. This may have downstream effects on physical security, safety monitoring, and compliance with regulatory requirements for surveillance in sectors such as transportation, utilities, and public safety. The requirement for local network access limits remote exploitation risk but increases the importance of internal network security and segmentation. Organizations with large deployments of Ningyuanda TC155 devices or those in critical infrastructure sectors are at higher risk. The lack of vendor response and patches prolongs exposure, necessitating proactive mitigation. Additionally, public disclosure of the exploit code increases the risk of opportunistic attacks by insiders or lateral movement attackers within compromised networks.
Mitigation Recommendations
1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user networks, limiting local network access to trusted administrators and systems only. 2. Monitor RTSP traffic for unusual patterns or malformed requests that could indicate exploitation attempts. 3. Employ network access control (NAC) solutions to restrict which devices can communicate with the TC155 units. 4. Use firewall rules to limit RTSP service access to known IP addresses and subnets. 5. Regularly audit and update internal network security policies to reduce the risk of unauthorized local network access. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalies in RTSP traffic. 7. Maintain an inventory of all Ningyuanda TC155 devices and track firmware versions to identify affected units. 8. Engage with Ningyuanda or third-party security providers for potential unofficial patches or workarounds. 9. Prepare incident response plans for denial of service events affecting RTSP services to minimize operational impact. 10. Educate internal staff about the risk of local network threats and enforce strong physical and logical access controls.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-15T20:39:14.928Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6940c7c9d9bcdf3f3d1a9810
Added to database: 12/16/2025, 2:45:29 AM
Last enriched: 12/23/2025, 4:47:09 AM
Last updated: 2/5/2026, 8:13:50 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25575: CWE-23: Relative Path Traversal in TUM-Dev NavigaTUM
HighCVE-2025-10258: Vulnerability in Nokia Infinera DNA
UnknownCVE-2026-1268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brechtvds Dynamic Widget Content
MediumCVE-2026-1246: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
MediumCVE-2026-0867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in catchthemes Essential Widgets
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.