CVE-2025-7503: CWE-798: Use of Hard-coded Credentials in Shenzhen Liandian Communication Technology LTD V380 IP Camera / AppFHE1_V1.0.6.0
An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation.
AI Analysis
Technical Summary
CVE-2025-7503 is a critical vulnerability affecting the V380 IP Camera manufactured by Shenzhen Liandian Communication Technology LTD, specifically firmware version AppFHE1_V1.0.6.0. This vulnerability stems from the use of hard-coded, undocumented default credentials that provide access to the Telnet service running on port 23. The Telnet service is enabled by default and cannot be disabled or configured through the device’s web interface or user manual, effectively exposing the device to unauthorized access. An attacker with network access to the device can authenticate using these default credentials without any user interaction or prior authentication, gaining root-level shell access. This level of access allows for remote code execution and privilege escalation, enabling an attacker to fully control the device, potentially pivot to other network assets, or use the device as part of a botnet or other malicious infrastructure. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a common and severe security flaw. No official patches or firmware updates are available, and the vendor is unresponsive, leaving affected devices permanently vulnerable unless mitigated by other means. The CVSS v4.0 score is 10.0 (critical), reflecting the vulnerability’s ease of exploitation (no authentication or user interaction required), high impact on confidentiality, integrity, and availability, and the broad scope of affected devices. Although no known exploits have been reported in the wild yet, the severity and nature of this vulnerability make it a prime target for attackers once discovered.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying Shenzhen Liandian’s V380 IP cameras in their physical security infrastructure. Compromise of these cameras can lead to unauthorized surveillance, data leakage, and network infiltration. Root access to the device allows attackers to manipulate video feeds, disable security monitoring, or use the device as a foothold to launch further attacks within the corporate network. Given the criticality and lack of vendor support, organizations face challenges in securing these devices, potentially leading to prolonged exposure. In sectors such as critical infrastructure, government facilities, and enterprises with sensitive environments, the impact could be severe, including regulatory non-compliance under GDPR if personal data is compromised. Additionally, compromised cameras could be conscripted into botnets, contributing to broader cybercrime activities affecting European networks. The inability to patch or disable the vulnerable service increases the risk of exploitation, especially in environments where network segmentation or device isolation is insufficient.
Mitigation Recommendations
Since no official firmware update or patch is available, European organizations should implement compensating controls. These include: 1) Network segmentation to isolate vulnerable IP cameras from critical network segments and sensitive data systems; 2) Blocking Telnet port 23 traffic at network firewalls or access control lists to prevent unauthorized remote access; 3) Deploying network intrusion detection/prevention systems (IDS/IPS) to monitor and alert on suspicious Telnet activity; 4) Replacing affected devices with more secure alternatives from vendors with active security support; 5) If replacement is not immediately feasible, consider disabling the devices or physically disconnecting them from the network; 6) Conducting regular network scans to identify devices running vulnerable firmware versions; 7) Implementing strict network access controls and monitoring for anomalous device behavior; 8) Educating staff about the risks associated with unmanaged IoT devices. These measures go beyond generic advice by focusing on network-level controls and device lifecycle management given the absence of vendor remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7503: CWE-798: Use of Hard-coded Credentials in Shenzhen Liandian Communication Technology LTD V380 IP Camera / AppFHE1_V1.0.6.0
Description
An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation.
AI-Powered Analysis
Technical Analysis
CVE-2025-7503 is a critical vulnerability affecting the V380 IP Camera manufactured by Shenzhen Liandian Communication Technology LTD, specifically firmware version AppFHE1_V1.0.6.0. This vulnerability stems from the use of hard-coded, undocumented default credentials that provide access to the Telnet service running on port 23. The Telnet service is enabled by default and cannot be disabled or configured through the device’s web interface or user manual, effectively exposing the device to unauthorized access. An attacker with network access to the device can authenticate using these default credentials without any user interaction or prior authentication, gaining root-level shell access. This level of access allows for remote code execution and privilege escalation, enabling an attacker to fully control the device, potentially pivot to other network assets, or use the device as part of a botnet or other malicious infrastructure. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a common and severe security flaw. No official patches or firmware updates are available, and the vendor is unresponsive, leaving affected devices permanently vulnerable unless mitigated by other means. The CVSS v4.0 score is 10.0 (critical), reflecting the vulnerability’s ease of exploitation (no authentication or user interaction required), high impact on confidentiality, integrity, and availability, and the broad scope of affected devices. Although no known exploits have been reported in the wild yet, the severity and nature of this vulnerability make it a prime target for attackers once discovered.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying Shenzhen Liandian’s V380 IP cameras in their physical security infrastructure. Compromise of these cameras can lead to unauthorized surveillance, data leakage, and network infiltration. Root access to the device allows attackers to manipulate video feeds, disable security monitoring, or use the device as a foothold to launch further attacks within the corporate network. Given the criticality and lack of vendor support, organizations face challenges in securing these devices, potentially leading to prolonged exposure. In sectors such as critical infrastructure, government facilities, and enterprises with sensitive environments, the impact could be severe, including regulatory non-compliance under GDPR if personal data is compromised. Additionally, compromised cameras could be conscripted into botnets, contributing to broader cybercrime activities affecting European networks. The inability to patch or disable the vulnerable service increases the risk of exploitation, especially in environments where network segmentation or device isolation is insufficient.
Mitigation Recommendations
Since no official firmware update or patch is available, European organizations should implement compensating controls. These include: 1) Network segmentation to isolate vulnerable IP cameras from critical network segments and sensitive data systems; 2) Blocking Telnet port 23 traffic at network firewalls or access control lists to prevent unauthorized remote access; 3) Deploying network intrusion detection/prevention systems (IDS/IPS) to monitor and alert on suspicious Telnet activity; 4) Replacing affected devices with more secure alternatives from vendors with active security support; 5) If replacement is not immediately feasible, consider disabling the devices or physically disconnecting them from the network; 6) Conducting regular network scans to identify devices running vulnerable firmware versions; 7) Implementing strict network access controls and monitoring for anomalous device behavior; 8) Educating staff about the risks associated with unmanaged IoT devices. These measures go beyond generic advice by focusing on network-level controls and device lifecycle management given the absence of vendor remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Toreon
- Date Reserved
- 2025-07-11T18:53:07.764Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68715f74a83201eaacb00bf0
Added to database: 7/11/2025, 7:01:08 PM
Last enriched: 7/11/2025, 7:16:12 PM
Last updated: 7/12/2025, 12:27:04 AM
Views: 6
Related Threats
CVE-2025-5199: CWE-276 Incorrect Default Permissions in Canonical Multipass
HighCVE-2025-7460: Buffer Overflow in TOTOLINK T6
HighCVE-2025-53636: CWE-400: Uncontrolled Resource Consumption in OSC ondemand
MediumCVE-2025-7459: SQL Injection in code-projects Mobile Shop
MediumCVE-2025-7457: SQL Injection in Campcodes Online Movie Theater Seat Reservation System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.