Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14749: Improper Access Controls in Ningyuanda TC155

0
Medium
VulnerabilityCVE-2025-14749cvecve-2025-14749
Published: Tue Dec 16 2025 (12/16/2025, 03:02:10 UTC)
Source: CVE Database V5
Vendor/Project: Ningyuanda
Product: TC155

Description

A vulnerability was identified in Ningyuanda TC155 57.0.2.0. This impacts an unknown function of the file /onvif/device_service of the component ONVIF PTZ Control Interface. The manipulation leads to improper access controls. The attack requires being on the local network. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/16/2025, 03:30:17 UTC

Technical Analysis

CVE-2025-14749 identifies an improper access control vulnerability in the Ningyuanda TC155 device, version 57.0.2.0, specifically within the ONVIF PTZ Control Interface component accessed via the /onvif/device_service endpoint. ONVIF is a standard protocol widely used for IP-based video surveillance devices, including PTZ (pan-tilt-zoom) cameras. The vulnerability allows an attacker on the same local network segment to bypass access controls and potentially manipulate device functions without requiring authentication or user interaction. The CVSS 4.0 vector indicates the attack complexity is low, no privileges or user interaction are needed, and the impact is limited to low confidentiality, integrity, and availability impacts. The exploit is publicly available, increasing the risk of exploitation, although no active exploitation has been reported. The vendor Ningyuanda has not issued any patches or responded to vulnerability disclosure efforts, leaving affected devices exposed. This vulnerability could enable unauthorized control over PTZ camera movements or other device functions, potentially disrupting surveillance operations or enabling further lateral movement within a network. The lack of network-level authentication or access controls on the affected interface is the root cause. Given the device’s role in security monitoring, exploitation could degrade situational awareness or facilitate covert surveillance manipulation.

Potential Impact

For European organizations, especially those relying on Ningyuanda TC155 devices for surveillance in critical infrastructure, public safety, or corporate security, this vulnerability poses a risk of unauthorized manipulation of PTZ camera controls. This could lead to blind spots in surveillance coverage, allowing malicious actors to evade detection or conduct physical intrusions unnoticed. The local network attack vector means that attackers would need to gain access to the internal network, which could be achieved via compromised devices, insider threats, or poorly segmented networks. The impact on confidentiality is low but not negligible, as unauthorized access to camera controls could reveal sensitive operational details. Integrity and availability impacts are also low to medium, as attackers could disrupt camera functionality or manipulate video feeds. The absence of vendor patches increases the risk exposure duration. Organizations in sectors such as transportation, energy, government, and large enterprises with extensive surveillance deployments are particularly at risk. The vulnerability could also facilitate broader network compromise if used as a pivot point. Overall, the threat undermines trust in surveillance infrastructure and could have operational and security consequences.

Mitigation Recommendations

1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user and guest networks, limiting local network access to trusted administrators only. 2. Deploy network access controls such as 802.1X authentication and VLANs to restrict device communication and reduce attack surface. 3. Monitor network traffic to and from /onvif/device_service endpoints for unusual or unauthorized access attempts, using IDS/IPS solutions with custom signatures if possible. 4. Disable or restrict ONVIF PTZ control interfaces if not required for operational purposes. 5. Use strong physical security controls to prevent unauthorized local network access. 6. Regularly audit device configurations and firmware versions to identify affected devices. 7. Engage with Ningyuanda or third-party security providers for potential unofficial patches or workarounds. 8. Prepare incident response plans that include scenarios involving surveillance device compromise. 9. Consider deploying compensating controls such as additional video analytics or redundant camera coverage to mitigate potential blind spots. 10. Maintain awareness of any future vendor updates or community advisories regarding this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-15T20:39:20.608Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940cec5d9bcdf3f3d1f60d9

Added to database: 12/16/2025, 3:15:17 AM

Last enriched: 12/16/2025, 3:30:17 AM

Last updated: 12/16/2025, 7:49:39 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats