Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14748: Improper Access Controls in Ningyuanda TC155

0
Medium
VulnerabilityCVE-2025-14748cvecve-2025-14748
Published: Tue Dec 16 2025 (12/16/2025, 03:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Ningyuanda
Product: TC155

Description

A vulnerability was determined in Ningyuanda TC155 57.0.2.0. This affects an unknown function of the file /onvif/device_service of the component ONVIF Device Management Service. Executing manipulation of the argument FactoryDefault with the input Hard can lead to improper access controls. The attack requires access to the local network. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/16/2025, 03:30:34 UTC

Technical Analysis

CVE-2025-14748 identifies an improper access control vulnerability in the Ningyuanda TC155 device, version 57.0.2.0, specifically within the ONVIF Device Management Service component. The vulnerability resides in the handling of the FactoryDefault argument in the /onvif/device_service endpoint. By sending a crafted request with the argument set to 'Hard', an attacker with access to the local network can bypass intended access restrictions, potentially resetting device configurations or gaining unauthorized control. The attack vector requires no authentication or user interaction, making it relatively straightforward for an insider or an attacker who has penetrated the local network perimeter. The vendor was notified early but has not issued any patches or mitigations, leaving the vulnerability unaddressed. The CVSS 4.0 base score of 5.3 reflects a medium severity, driven by the local network attack vector, low attack complexity, and the absence of required privileges or user interaction. While no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation. The vulnerability could impact device integrity and availability by allowing unauthorized configuration changes, which may disrupt surveillance or monitoring operations relying on these devices. The lack of network segmentation or weak local network security could facilitate exploitation. This vulnerability highlights the importance of secure access controls in IoT and networked device management services, especially those exposed to local networks in enterprise or critical infrastructure environments.

Potential Impact

For European organizations, the vulnerability poses a risk primarily to environments where Ningyuanda TC155 devices are deployed, such as surveillance, security monitoring, or industrial control systems. Unauthorized manipulation of device settings could lead to denial of service, loss of monitoring capabilities, or unauthorized access to sensitive video feeds or device controls. This could impact confidentiality, integrity, and availability of security systems. Organizations in sectors like critical infrastructure, manufacturing, transportation, and public safety could face operational disruptions or data breaches. The requirement for local network access limits remote exploitation but increases the importance of internal network security. Insider threats or lateral movement by attackers within corporate networks could leverage this vulnerability to escalate access or disrupt operations. The absence of vendor response and patches increases exposure duration, necessitating proactive defensive measures. Additionally, regulatory compliance in Europe (e.g., GDPR, NIS Directive) may be impacted if personal data or critical services are compromised due to this vulnerability.

Mitigation Recommendations

1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user networks and untrusted devices, limiting local network access to authorized personnel and systems only. 2. Employ robust internal network access controls, including VLANs, ACLs, and firewall rules, to restrict traffic to the /onvif/device_service endpoint. 3. Monitor network traffic for unusual or unauthorized requests targeting the FactoryDefault argument or ONVIF services, using IDS/IPS solutions tuned for IoT device protocols. 4. Disable or restrict ONVIF services if not required, or configure devices to require authentication for management functions if supported. 5. Maintain an asset inventory to identify all affected devices and prioritize their protection. 6. Engage with Ningyuanda or authorized resellers to seek firmware updates or official patches; if unavailable, consider device replacement or additional compensating controls. 7. Conduct regular security audits and penetration tests focusing on local network vulnerabilities and IoT device management interfaces. 8. Educate internal teams on the risks of local network threats and enforce least privilege principles for network access. 9. Prepare incident response plans specific to IoT device compromise scenarios to minimize impact if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-15T20:39:17.819Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940cec5d9bcdf3f3d1f60d3

Added to database: 12/16/2025, 3:15:17 AM

Last enriched: 12/16/2025, 3:30:34 AM

Last updated: 12/16/2025, 9:00:35 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats