Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66051: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Vivotek IP7137

0
Medium
VulnerabilityCVE-2025-66051cvecve-2025-66051cwe-22
Published: Fri Jan 09 2026 (01/09/2026, 11:54:09 UTC)
Source: CVE Database V5
Vendor/Project: Vivotek
Product: IP7137

Description

Vivotek IP7137 camera with firmware version 0200a is vulnerable to path traversal. It is possible for an authenticated attacker to access resources beyond webroot directory using a direct HTTP request. Due to CVE-2025-66050, a password for administration panel is not set by default. The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

AI-Powered Analysis

AILast updated: 01/09/2026, 12:08:06 UTC

Technical Analysis

CVE-2025-66051 is a path traversal vulnerability classified under CWE-22 affecting the Vivotek IP7137 network camera, specifically firmware version 0200a. This vulnerability allows an attacker with authenticated access to the device's web interface to craft HTTP requests that traverse directories beyond the intended webroot, potentially exposing sensitive files or system resources. The vulnerability is exacerbated by CVE-2025-66050, which reveals that the administration panel password is unset by default, effectively lowering the barrier to authentication and increasing the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with an attack vector over the network, low attack complexity, no privileges required (due to default password), no user interaction, and high impact on confidentiality. The vendor has not responded to the CNA and the product is at end-of-life, meaning no official patches or firmware updates are expected. This leaves affected devices permanently vulnerable unless mitigated by other means. The path traversal flaw can be exploited to read arbitrary files on the device, which may include configuration files, credentials, or logs, potentially leading to further compromise or lateral movement within a network. Given the nature of IP cameras as security devices, unauthorized access could also enable attackers to manipulate video feeds or disrupt surveillance operations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially in sectors relying heavily on IP surveillance such as critical infrastructure, transportation, government facilities, and corporate environments. Unauthorized access to camera files could expose sensitive configuration data or credentials, facilitating further attacks on the network. The lack of a default password increases the likelihood of unauthorized access, potentially allowing attackers to bypass authentication entirely. Compromise of surveillance devices can lead to loss of video integrity, privacy violations, and disruption of security monitoring. Since the product is end-of-life and unpatched, organizations face a persistent risk. Additionally, attackers could leverage the vulnerability to pivot into internal networks, increasing the risk of broader compromise. The medium CVSS score reflects a moderate but tangible threat, particularly when combined with the default password issue. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a critical risk for any organization still operating these devices.

Mitigation Recommendations

Given the lack of vendor patches, European organizations should implement compensating controls to mitigate this vulnerability. First, immediately change any default or blank passwords on the administration panel to strong, unique credentials to prevent unauthorized access. If possible, disable remote access to the camera's web interface, restricting management to trusted internal networks only. Network segmentation should be employed to isolate IP cameras from critical systems and limit lateral movement opportunities. Employ firewall rules to restrict inbound and outbound traffic to and from the camera devices. Monitor network traffic and device logs for unusual access patterns or attempts to exploit path traversal. Consider replacing end-of-life Vivotek IP7137 cameras with supported models that receive security updates. If replacement is not immediately feasible, deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect path traversal attempts. Regularly audit and inventory all IP cameras to ensure no unmanaged or vulnerable devices remain in operation. Finally, educate staff responsible for device management about the risks and ensure secure configuration practices are followed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-21T10:41:30.020Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6960eda77a8fb5c58f471d1a

Added to database: 1/9/2026, 11:59:35 AM

Last enriched: 1/9/2026, 12:08:06 PM

Last updated: 2/24/2026, 4:37:21 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats