CVE-2025-66051: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Vivotek IP7137
Vivotek IP7137 camera with firmware version 0200a is vulnerable to path traversal. It is possible for an authenticated attacker to access resources beyond webroot directory using a direct HTTP request. Due to CVE-2025-66050, a password for administration panel is not set by default. The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.
AI Analysis
Technical Summary
CVE-2025-66051 is a path traversal vulnerability classified under CWE-22 affecting the Vivotek IP7137 network camera, specifically firmware version 0200a. This vulnerability allows an attacker with authenticated access to the device's web interface to craft HTTP requests that traverse directories beyond the intended webroot, potentially exposing sensitive files or system resources. The vulnerability is exacerbated by CVE-2025-66050, which reveals that the administration panel password is unset by default, effectively lowering the barrier to authentication and increasing the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with an attack vector over the network, low attack complexity, no privileges required (due to default password), no user interaction, and high impact on confidentiality. The vendor has not responded to the CNA and the product is at end-of-life, meaning no official patches or firmware updates are expected. This leaves affected devices permanently vulnerable unless mitigated by other means. The path traversal flaw can be exploited to read arbitrary files on the device, which may include configuration files, credentials, or logs, potentially leading to further compromise or lateral movement within a network. Given the nature of IP cameras as security devices, unauthorized access could also enable attackers to manipulate video feeds or disrupt surveillance operations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially in sectors relying heavily on IP surveillance such as critical infrastructure, transportation, government facilities, and corporate environments. Unauthorized access to camera files could expose sensitive configuration data or credentials, facilitating further attacks on the network. The lack of a default password increases the likelihood of unauthorized access, potentially allowing attackers to bypass authentication entirely. Compromise of surveillance devices can lead to loss of video integrity, privacy violations, and disruption of security monitoring. Since the product is end-of-life and unpatched, organizations face a persistent risk. Additionally, attackers could leverage the vulnerability to pivot into internal networks, increasing the risk of broader compromise. The medium CVSS score reflects a moderate but tangible threat, particularly when combined with the default password issue. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a critical risk for any organization still operating these devices.
Mitigation Recommendations
Given the lack of vendor patches, European organizations should implement compensating controls to mitigate this vulnerability. First, immediately change any default or blank passwords on the administration panel to strong, unique credentials to prevent unauthorized access. If possible, disable remote access to the camera's web interface, restricting management to trusted internal networks only. Network segmentation should be employed to isolate IP cameras from critical systems and limit lateral movement opportunities. Employ firewall rules to restrict inbound and outbound traffic to and from the camera devices. Monitor network traffic and device logs for unusual access patterns or attempts to exploit path traversal. Consider replacing end-of-life Vivotek IP7137 cameras with supported models that receive security updates. If replacement is not immediately feasible, deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect path traversal attempts. Regularly audit and inventory all IP cameras to ensure no unmanaged or vulnerable devices remain in operation. Finally, educate staff responsible for device management about the risks and ensure secure configuration practices are followed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-66051: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Vivotek IP7137
Description
Vivotek IP7137 camera with firmware version 0200a is vulnerable to path traversal. It is possible for an authenticated attacker to access resources beyond webroot directory using a direct HTTP request. Due to CVE-2025-66050, a password for administration panel is not set by default. The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.
AI-Powered Analysis
Technical Analysis
CVE-2025-66051 is a path traversal vulnerability classified under CWE-22 affecting the Vivotek IP7137 network camera, specifically firmware version 0200a. This vulnerability allows an attacker with authenticated access to the device's web interface to craft HTTP requests that traverse directories beyond the intended webroot, potentially exposing sensitive files or system resources. The vulnerability is exacerbated by CVE-2025-66050, which reveals that the administration panel password is unset by default, effectively lowering the barrier to authentication and increasing the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with an attack vector over the network, low attack complexity, no privileges required (due to default password), no user interaction, and high impact on confidentiality. The vendor has not responded to the CNA and the product is at end-of-life, meaning no official patches or firmware updates are expected. This leaves affected devices permanently vulnerable unless mitigated by other means. The path traversal flaw can be exploited to read arbitrary files on the device, which may include configuration files, credentials, or logs, potentially leading to further compromise or lateral movement within a network. Given the nature of IP cameras as security devices, unauthorized access could also enable attackers to manipulate video feeds or disrupt surveillance operations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially in sectors relying heavily on IP surveillance such as critical infrastructure, transportation, government facilities, and corporate environments. Unauthorized access to camera files could expose sensitive configuration data or credentials, facilitating further attacks on the network. The lack of a default password increases the likelihood of unauthorized access, potentially allowing attackers to bypass authentication entirely. Compromise of surveillance devices can lead to loss of video integrity, privacy violations, and disruption of security monitoring. Since the product is end-of-life and unpatched, organizations face a persistent risk. Additionally, attackers could leverage the vulnerability to pivot into internal networks, increasing the risk of broader compromise. The medium CVSS score reflects a moderate but tangible threat, particularly when combined with the default password issue. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a critical risk for any organization still operating these devices.
Mitigation Recommendations
Given the lack of vendor patches, European organizations should implement compensating controls to mitigate this vulnerability. First, immediately change any default or blank passwords on the administration panel to strong, unique credentials to prevent unauthorized access. If possible, disable remote access to the camera's web interface, restricting management to trusted internal networks only. Network segmentation should be employed to isolate IP cameras from critical systems and limit lateral movement opportunities. Employ firewall rules to restrict inbound and outbound traffic to and from the camera devices. Monitor network traffic and device logs for unusual access patterns or attempts to exploit path traversal. Consider replacing end-of-life Vivotek IP7137 cameras with supported models that receive security updates. If replacement is not immediately feasible, deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect path traversal attempts. Regularly audit and inventory all IP cameras to ensure no unmanaged or vulnerable devices remain in operation. Finally, educate staff responsible for device management about the risks and ensure secure configuration practices are followed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-11-21T10:41:30.020Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6960eda77a8fb5c58f471d1a
Added to database: 1/9/2026, 11:59:35 AM
Last enriched: 1/9/2026, 12:08:06 PM
Last updated: 2/24/2026, 4:37:21 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3069: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3068: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3067: Path Traversal in HummerRisk
MediumCVE-2026-3066: Command Injection in HummerRisk
MediumCVE-2026-3091: Uncontrolled Search Path Element in Synology Synology Presto Client
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.