Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14747: Denial of Service in Ningyuanda TC155

0
Medium
VulnerabilityCVE-2025-14747cvecve-2025-14747
Published: Tue Dec 16 2025 (12/16/2025, 02:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Ningyuanda
Product: TC155

Description

A vulnerability was found in Ningyuanda TC155 57.0.2.0. The impacted element is an unknown function of the component RTSP Service. Performing manipulation results in denial of service. The attack must originate from the local network. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/23/2025, 04:47:09 UTC

Technical Analysis

CVE-2025-14747 is a denial of service vulnerability identified in the RTSP Service component of Ningyuanda TC155 firmware version 57.0.2.0. The vulnerability arises from an unspecified function within the RTSP service that, when manipulated by an attacker on the same local network, can cause the device or service to crash or become unresponsive, effectively resulting in a denial of service condition. The attack vector requires local network access, meaning the attacker must be on the same subnet or have network-level access to the device. No privileges, authentication, or user interaction are necessary to exploit this vulnerability, which increases its risk within trusted internal networks. The CVSS 4.0 base score is 5.3, reflecting a medium severity level primarily due to the limited attack vector (local network) and the impact being restricted to availability. The vendor Ningyuanda has not issued any patches or responded to disclosure attempts, leaving affected devices exposed. The exploit details have been made public, increasing the likelihood of potential exploitation, although no active exploitation has been reported to date. The vulnerability could disrupt services relying on the RTSP protocol, commonly used for streaming video and audio, impacting surveillance, monitoring, or communication systems that utilize the TC155 device. Since the affected function is unknown, detailed technical mitigation is challenging, but network-level controls and monitoring are critical.

Potential Impact

For European organizations, the primary impact of CVE-2025-14747 is the potential disruption of services relying on Ningyuanda TC155 devices, particularly those using RTSP streaming for surveillance, security monitoring, or communication. Denial of service conditions could lead to temporary loss of video feeds or interruption of critical monitoring systems, affecting operational continuity and situational awareness. This may have downstream effects on physical security, safety monitoring, and compliance with regulatory requirements for surveillance in sectors such as transportation, utilities, and public safety. The requirement for local network access limits remote exploitation risk but increases the importance of internal network security and segmentation. Organizations with large deployments of Ningyuanda TC155 devices or those in critical infrastructure sectors are at higher risk. The lack of vendor response and patches prolongs exposure, necessitating proactive mitigation. Additionally, public disclosure of the exploit code increases the risk of opportunistic attacks by insiders or lateral movement attackers within compromised networks.

Mitigation Recommendations

1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user networks, limiting local network access to trusted administrators and systems only. 2. Monitor RTSP traffic for unusual patterns or malformed requests that could indicate exploitation attempts. 3. Employ network access control (NAC) solutions to restrict which devices can communicate with the TC155 units. 4. Use firewall rules to limit RTSP service access to known IP addresses and subnets. 5. Regularly audit and update internal network security policies to reduce the risk of unauthorized local network access. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalies in RTSP traffic. 7. Maintain an inventory of all Ningyuanda TC155 devices and track firmware versions to identify affected units. 8. Engage with Ningyuanda or third-party security providers for potential unofficial patches or workarounds. 9. Prepare incident response plans for denial of service events affecting RTSP services to minimize operational impact. 10. Educate internal staff about the risk of local network threats and enforce strong physical and logical access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-15T20:39:14.928Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940c7c9d9bcdf3f3d1a9810

Added to database: 12/16/2025, 2:45:29 AM

Last enriched: 12/23/2025, 4:47:09 AM

Last updated: 2/7/2026, 9:33:22 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats