CVE-2025-14748: Improper Access Controls in Ningyuanda TC155
A vulnerability was determined in Ningyuanda TC155 57.0.2.0. This affects an unknown function of the file /onvif/device_service of the component ONVIF Device Management Service. Executing manipulation of the argument FactoryDefault with the input Hard can lead to improper access controls. The attack requires access to the local network. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14748 identifies an improper access control vulnerability in the Ningyuanda TC155 device, version 57.0.2.0, specifically within the ONVIF Device Management Service component. The vulnerability resides in the handling of the FactoryDefault argument in the /onvif/device_service endpoint. By sending a crafted request with the argument set to 'Hard', an attacker with access to the local network can bypass intended access restrictions, potentially resetting device configurations or gaining unauthorized control. The attack vector requires no authentication or user interaction, making it relatively straightforward for an insider or an attacker who has penetrated the local network perimeter. The vendor was notified early but has not issued any patches or mitigations, leaving the vulnerability unaddressed. The CVSS 4.0 base score of 5.3 reflects a medium severity, driven by the local network attack vector, low attack complexity, and the absence of required privileges or user interaction. While no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation. The vulnerability could impact device integrity and availability by allowing unauthorized configuration changes, which may disrupt surveillance or monitoring operations relying on these devices. The lack of network segmentation or weak local network security could facilitate exploitation. This vulnerability highlights the importance of secure access controls in IoT and networked device management services, especially those exposed to local networks in enterprise or critical infrastructure environments.
Potential Impact
For European organizations, the vulnerability poses a risk primarily to environments where Ningyuanda TC155 devices are deployed, such as surveillance, security monitoring, or industrial control systems. Unauthorized manipulation of device settings could lead to denial of service, loss of monitoring capabilities, or unauthorized access to sensitive video feeds or device controls. This could impact confidentiality, integrity, and availability of security systems. Organizations in sectors like critical infrastructure, manufacturing, transportation, and public safety could face operational disruptions or data breaches. The requirement for local network access limits remote exploitation but increases the importance of internal network security. Insider threats or lateral movement by attackers within corporate networks could leverage this vulnerability to escalate access or disrupt operations. The absence of vendor response and patches increases exposure duration, necessitating proactive defensive measures. Additionally, regulatory compliance in Europe (e.g., GDPR, NIS Directive) may be impacted if personal data or critical services are compromised due to this vulnerability.
Mitigation Recommendations
1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user networks and untrusted devices, limiting local network access to authorized personnel and systems only. 2. Employ robust internal network access controls, including VLANs, ACLs, and firewall rules, to restrict traffic to the /onvif/device_service endpoint. 3. Monitor network traffic for unusual or unauthorized requests targeting the FactoryDefault argument or ONVIF services, using IDS/IPS solutions tuned for IoT device protocols. 4. Disable or restrict ONVIF services if not required, or configure devices to require authentication for management functions if supported. 5. Maintain an asset inventory to identify all affected devices and prioritize their protection. 6. Engage with Ningyuanda or authorized resellers to seek firmware updates or official patches; if unavailable, consider device replacement or additional compensating controls. 7. Conduct regular security audits and penetration tests focusing on local network vulnerabilities and IoT device management interfaces. 8. Educate internal teams on the risks of local network threats and enforce least privilege principles for network access. 9. Prepare incident response plans specific to IoT device compromise scenarios to minimize impact if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-14748: Improper Access Controls in Ningyuanda TC155
Description
A vulnerability was determined in Ningyuanda TC155 57.0.2.0. This affects an unknown function of the file /onvif/device_service of the component ONVIF Device Management Service. Executing manipulation of the argument FactoryDefault with the input Hard can lead to improper access controls. The attack requires access to the local network. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14748 identifies an improper access control vulnerability in the Ningyuanda TC155 device, version 57.0.2.0, specifically within the ONVIF Device Management Service component. The vulnerability resides in the handling of the FactoryDefault argument in the /onvif/device_service endpoint. By sending a crafted request with the argument set to 'Hard', an attacker with access to the local network can bypass intended access restrictions, potentially resetting device configurations or gaining unauthorized control. The attack vector requires no authentication or user interaction, making it relatively straightforward for an insider or an attacker who has penetrated the local network perimeter. The vendor was notified early but has not issued any patches or mitigations, leaving the vulnerability unaddressed. The CVSS 4.0 base score of 5.3 reflects a medium severity, driven by the local network attack vector, low attack complexity, and the absence of required privileges or user interaction. While no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation. The vulnerability could impact device integrity and availability by allowing unauthorized configuration changes, which may disrupt surveillance or monitoring operations relying on these devices. The lack of network segmentation or weak local network security could facilitate exploitation. This vulnerability highlights the importance of secure access controls in IoT and networked device management services, especially those exposed to local networks in enterprise or critical infrastructure environments.
Potential Impact
For European organizations, the vulnerability poses a risk primarily to environments where Ningyuanda TC155 devices are deployed, such as surveillance, security monitoring, or industrial control systems. Unauthorized manipulation of device settings could lead to denial of service, loss of monitoring capabilities, or unauthorized access to sensitive video feeds or device controls. This could impact confidentiality, integrity, and availability of security systems. Organizations in sectors like critical infrastructure, manufacturing, transportation, and public safety could face operational disruptions or data breaches. The requirement for local network access limits remote exploitation but increases the importance of internal network security. Insider threats or lateral movement by attackers within corporate networks could leverage this vulnerability to escalate access or disrupt operations. The absence of vendor response and patches increases exposure duration, necessitating proactive defensive measures. Additionally, regulatory compliance in Europe (e.g., GDPR, NIS Directive) may be impacted if personal data or critical services are compromised due to this vulnerability.
Mitigation Recommendations
1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user networks and untrusted devices, limiting local network access to authorized personnel and systems only. 2. Employ robust internal network access controls, including VLANs, ACLs, and firewall rules, to restrict traffic to the /onvif/device_service endpoint. 3. Monitor network traffic for unusual or unauthorized requests targeting the FactoryDefault argument or ONVIF services, using IDS/IPS solutions tuned for IoT device protocols. 4. Disable or restrict ONVIF services if not required, or configure devices to require authentication for management functions if supported. 5. Maintain an asset inventory to identify all affected devices and prioritize their protection. 6. Engage with Ningyuanda or authorized resellers to seek firmware updates or official patches; if unavailable, consider device replacement or additional compensating controls. 7. Conduct regular security audits and penetration tests focusing on local network vulnerabilities and IoT device management interfaces. 8. Educate internal teams on the risks of local network threats and enforce least privilege principles for network access. 9. Prepare incident response plans specific to IoT device compromise scenarios to minimize impact if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-15T20:39:17.819Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6940cec5d9bcdf3f3d1f60d3
Added to database: 12/16/2025, 3:15:17 AM
Last enriched: 12/16/2025, 3:30:34 AM
Last updated: 12/16/2025, 9:00:35 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13231: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in radykal Fancy Product Designer
MediumCVE-2025-68088: Missing Authorization in merkulove Huger for Elementor
HighCVE-2025-68087: Missing Authorization in merkulove Modalier for Elementor
HighCVE-2025-68086: Missing Authorization in merkulove Reformer for Elementor
HighCVE-2025-68085: Missing Authorization in merkulove Buttoner for Elementor
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.