Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66052: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Vivotek IP7137

0
High
VulnerabilityCVE-2025-66052cvecve-2025-66052cwe-78
Published: Fri Jan 09 2026 (01/09/2026, 11:54:16 UTC)
Source: CVE Database V5
Vendor/Project: Vivotek
Product: IP7137

Description

Vivotek IP7137 camera with firmware version 0200a is vulnerable to command injection. Parameter "system_ntpIt" used by "/cgi-bin/admin/setparam.cgi" endpoint is not sanitized properly, allowing a user with administrative privileges to perform an attack. Due to CVE-2025-66050, administrative access is not protected by default,  The vendor has not replied to the CNA Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

AI-Powered Analysis

AILast updated: 01/09/2026, 13:14:02 UTC

Technical Analysis

CVE-2025-66052 is an OS command injection vulnerability affecting the Vivotek IP7137 IP camera firmware version 0200a. The vulnerability arises from improper neutralization of special elements in the 'system_ntpIt' parameter processed by the /cgi-bin/admin/setparam.cgi endpoint. Because input is not sanitized correctly, an attacker with administrative privileges can inject arbitrary OS commands, potentially leading to full system compromise. The attack vector is network-based, requiring no user interaction but administrative access. However, due to a related vulnerability (CVE-2025-66050), administrative access is not protected by default, significantly lowering the barrier to exploitation. The vendor has not responded to the CNA, and the product is end-of-life, so no firmware updates or patches are expected. This leaves all deployed devices vulnerable indefinitely. The vulnerability impacts confidentiality, integrity, and availability by enabling command execution, potentially allowing attackers to exfiltrate data, disrupt device operation, or pivot into internal networks. Although no public exploits are known, the high CVSS score (8.6) reflects the critical nature of the flaw. The vulnerability is categorized under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), a common and dangerous class of injection flaws. Given the device's role in surveillance and network monitoring, exploitation could have serious security implications.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those relying on Vivotek IP7137 cameras for security and surveillance. Exploitation can lead to unauthorized command execution, allowing attackers to manipulate camera functions, disable monitoring, or use the device as a foothold for lateral movement within corporate or critical infrastructure networks. The lack of default administrative access protection increases the likelihood of compromise, particularly in environments where default credentials or weak authentication are present. This can result in breaches of sensitive video feeds, loss of monitoring capabilities, and potential exposure of internal network segments. Organizations in sectors such as government, transportation, utilities, and critical infrastructure are particularly at risk due to the strategic importance of surveillance systems. The end-of-life status of the product means that organizations cannot rely on vendor patches and must instead implement compensating controls. The vulnerability could also impact compliance with European data protection regulations if video data confidentiality is compromised.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should take immediate compensating measures. First, isolate affected Vivotek IP7137 cameras on dedicated network segments with strict access controls and firewall rules limiting administrative access to trusted personnel only. Disable remote administrative access where possible. Change all default credentials and enforce strong, unique passwords for administrative accounts. Implement network monitoring and intrusion detection systems to identify suspicious activity targeting these devices. Consider replacing end-of-life cameras with supported models that receive security updates. If replacement is not immediately feasible, deploy virtual patching techniques such as web application firewalls (WAFs) configured to detect and block malicious payloads targeting the vulnerable parameter. Regularly audit device configurations and logs for signs of compromise. Additionally, educate IT and security teams about the vulnerability and its implications to ensure rapid incident response if exploitation is suspected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-21T10:41:30.020Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6960fbad7a8fb5c58f6b1a55

Added to database: 1/9/2026, 12:59:25 PM

Last enriched: 1/9/2026, 1:14:02 PM

Last updated: 1/10/2026, 2:34:24 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats