Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66176: Vulnerability in Hikvision DS-K1T331

0
High
VulnerabilityCVE-2025-66176cvecve-2025-66176
Published: Tue Jan 13 2026 (01/13/2026, 01:47:27 UTC)
Source: CVE Database V5
Vendor/Project: Hikvision
Product: DS-K1T331

Description

There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 18:22:07 UTC

Technical Analysis

CVE-2025-66176 identifies a stack overflow vulnerability in the Search and Discovery feature of the Hikvision DS-K1T331 access control device. This flaw arises from improper handling of network packets during the device’s discovery process, allowing an attacker on the same local area network to send specially crafted packets that overflow the stack. This overflow can cause the device to malfunction, potentially leading to denial of service or enabling further exploitation such as arbitrary code execution, depending on the device’s internal protections. The vulnerability affects firmware versions below V3.7.80 and does not require any authentication or user interaction, making it easier to exploit within a LAN environment. The CVSS v3.1 score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates a high-severity issue with low attack complexity and no privileges or user interaction needed. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and dangerous software flaw. No patches or exploits are currently publicly available, but the risk remains significant due to the critical role of access control devices in physical security and networked environments. The device’s exposure to internal networks makes it a prime target for attackers seeking to disrupt physical security or gain further network footholds.

Potential Impact

The exploitation of this vulnerability can have severe consequences for organizations relying on Hikvision DS-K1T331 devices for access control. A successful attack can cause device malfunction or denial of service, potentially disabling physical access controls and compromising facility security. The high impact on confidentiality, integrity, and availability means attackers could disrupt security monitoring, manipulate access logs, or use the compromised device as a pivot point for lateral movement within the network. This can lead to unauthorized physical access, data breaches, and operational disruptions. Organizations in critical infrastructure sectors, government, finance, and large enterprises that deploy these devices extensively are particularly at risk. The requirement for attacker presence on the LAN limits remote exploitation but does not eliminate risk, especially in environments with weak network segmentation or insider threats. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation once details become widely known.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately inventory all Hikvision DS-K1T331 devices and verify firmware versions, prioritizing upgrades to V3.7.80 or later once patches are released. 2) Until patches are available, restrict device network access by segmenting the LAN to isolate access control devices from general user networks and untrusted devices. 3) Employ network access controls such as VLANs, ACLs, and firewall rules to limit communication to and from these devices strictly to authorized management stations. 4) Monitor network traffic for unusual or malformed packets targeting the device’s discovery protocol, using IDS/IPS solutions tuned for Hikvision device signatures. 5) Implement strict physical and logical access controls to reduce insider threat risks. 6) Coordinate with Hikvision support for official patches and security advisories. 7) Conduct regular security assessments and penetration tests focusing on physical security infrastructure to detect potential exploitation attempts. These targeted steps go beyond generic advice by focusing on network segmentation, traffic monitoring, and proactive device management tailored to the vulnerability’s characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hikvision
Date Reserved
2025-11-24T08:59:35.903Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6965b0daa60475309ff8e4d7

Added to database: 1/13/2026, 2:41:30 AM

Last enriched: 3/18/2026, 6:22:07 PM

Last updated: 3/24/2026, 5:24:43 PM

Views: 522

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses