CVE-2025-7724: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. VIGI NVR1104H-4P V1
An unauthenticated OS command injection vulnerability exists in VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2.This issue affects VIGI NVR1104H-4P V1: before 1.1.5 Build 250518; VIGI NVR2016H-16MP V2: before 1.3.1 Build 250407.
AI Analysis
Technical Summary
CVE-2025-7724 is a high-severity OS command injection vulnerability identified in TP-Link Systems Inc.'s VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2 network video recorders (NVRs). The vulnerability arises due to improper neutralization of special elements used in OS commands (CWE-78), allowing an unauthenticated attacker to inject arbitrary OS commands. This flaw affects VIGI NVR1104H-4P V1 versions prior to 1.1.5 Build 250518 and VIGI NVR2016H-16MP V2 versions prior to 1.3.1 Build 250407. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector string (CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) shows that the attack requires adjacent network access (AV:A), has low attack complexity (AC:L), requires no authentication (PR:N), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level. Exploitation could allow attackers to execute arbitrary commands on the device's underlying operating system, potentially leading to full device compromise, data exfiltration, or disruption of video surveillance functions. No known exploits are currently reported in the wild, but the lack of authentication and ease of exploitation make this a critical concern for affected deployments. The absence of patch links suggests that fixes may not yet be publicly available or fully disseminated, increasing the urgency for mitigation and monitoring. Given the role of these NVRs in security infrastructure, exploitation could undermine physical security monitoring and incident response capabilities.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for entities relying on TP-Link VIGI NVR devices for video surveillance and security monitoring. Compromise of these devices could lead to unauthorized access to video feeds, manipulation or deletion of recorded footage, and disruption of security operations. This could have cascading effects on physical security, regulatory compliance (e.g., GDPR concerns regarding video data confidentiality), and operational continuity. Critical infrastructure sectors such as transportation hubs, government facilities, healthcare institutions, and corporate campuses using these NVRs are particularly vulnerable. Furthermore, the unauthenticated nature of the vulnerability increases the risk of remote exploitation from within internal networks or adjacent network segments, which are common in enterprise environments. The potential for attackers to gain persistent footholds or pivot to other internal systems elevates the threat level. The high confidentiality, integrity, and availability impact ratings underscore the severity of potential damage to European organizations’ security posture.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected NVR devices from general network access, restricting communication to only trusted management hosts and monitoring systems. 2. Apply vendor patches promptly once available: Monitor TP-Link advisories and update firmware to versions 1.1.5 Build 250518 or later for VIGI NVR1104H-4P V1 and 1.3.1 Build 250407 or later for VIGI NVR2016H-16MP V2. 3. Implement strict access controls: Limit network access to NVR management interfaces using firewalls, VPNs, or zero-trust network access solutions to prevent unauthorized access. 4. Monitor network traffic for anomalous commands or unusual activity targeting NVR devices, using IDS/IPS systems tuned for command injection patterns. 5. Disable or restrict unnecessary services and interfaces on the NVR devices to reduce attack surface. 6. Conduct regular security audits and penetration testing focusing on IoT and surveillance devices to detect similar vulnerabilities proactively. 7. Establish incident response plans specific to surveillance infrastructure compromise, including forensic readiness and rapid device isolation procedures. These measures go beyond generic advice by emphasizing network architecture changes, proactive monitoring, and operational readiness tailored to the unique role of NVR devices in security environments.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7724: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. VIGI NVR1104H-4P V1
Description
An unauthenticated OS command injection vulnerability exists in VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2.This issue affects VIGI NVR1104H-4P V1: before 1.1.5 Build 250518; VIGI NVR2016H-16MP V2: before 1.3.1 Build 250407.
AI-Powered Analysis
Technical Analysis
CVE-2025-7724 is a high-severity OS command injection vulnerability identified in TP-Link Systems Inc.'s VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2 network video recorders (NVRs). The vulnerability arises due to improper neutralization of special elements used in OS commands (CWE-78), allowing an unauthenticated attacker to inject arbitrary OS commands. This flaw affects VIGI NVR1104H-4P V1 versions prior to 1.1.5 Build 250518 and VIGI NVR2016H-16MP V2 versions prior to 1.3.1 Build 250407. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector string (CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) shows that the attack requires adjacent network access (AV:A), has low attack complexity (AC:L), requires no authentication (PR:N), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level. Exploitation could allow attackers to execute arbitrary commands on the device's underlying operating system, potentially leading to full device compromise, data exfiltration, or disruption of video surveillance functions. No known exploits are currently reported in the wild, but the lack of authentication and ease of exploitation make this a critical concern for affected deployments. The absence of patch links suggests that fixes may not yet be publicly available or fully disseminated, increasing the urgency for mitigation and monitoring. Given the role of these NVRs in security infrastructure, exploitation could undermine physical security monitoring and incident response capabilities.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for entities relying on TP-Link VIGI NVR devices for video surveillance and security monitoring. Compromise of these devices could lead to unauthorized access to video feeds, manipulation or deletion of recorded footage, and disruption of security operations. This could have cascading effects on physical security, regulatory compliance (e.g., GDPR concerns regarding video data confidentiality), and operational continuity. Critical infrastructure sectors such as transportation hubs, government facilities, healthcare institutions, and corporate campuses using these NVRs are particularly vulnerable. Furthermore, the unauthenticated nature of the vulnerability increases the risk of remote exploitation from within internal networks or adjacent network segments, which are common in enterprise environments. The potential for attackers to gain persistent footholds or pivot to other internal systems elevates the threat level. The high confidentiality, integrity, and availability impact ratings underscore the severity of potential damage to European organizations’ security posture.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected NVR devices from general network access, restricting communication to only trusted management hosts and monitoring systems. 2. Apply vendor patches promptly once available: Monitor TP-Link advisories and update firmware to versions 1.1.5 Build 250518 or later for VIGI NVR1104H-4P V1 and 1.3.1 Build 250407 or later for VIGI NVR2016H-16MP V2. 3. Implement strict access controls: Limit network access to NVR management interfaces using firewalls, VPNs, or zero-trust network access solutions to prevent unauthorized access. 4. Monitor network traffic for anomalous commands or unusual activity targeting NVR devices, using IDS/IPS systems tuned for command injection patterns. 5. Disable or restrict unnecessary services and interfaces on the NVR devices to reduce attack surface. 6. Conduct regular security audits and penetration testing focusing on IoT and surveillance devices to detect similar vulnerabilities proactively. 7. Establish incident response plans specific to surveillance infrastructure compromise, including forensic readiness and rapid device isolation procedures. These measures go beyond generic advice by emphasizing network architecture changes, proactive monitoring, and operational readiness tailored to the unique role of NVR devices in security environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TPLink
- Date Reserved
- 2025-07-16T17:55:23.376Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687ff9c9a915ff00f7fb1811
Added to database: 7/22/2025, 8:51:21 PM
Last enriched: 7/30/2025, 1:28:36 AM
Last updated: 9/4/2025, 9:50:07 PM
Views: 38
Related Threats
CVE-2025-10028: Cross Site Scripting in itsourcecode POS Point of Sale System
MediumCVE-2025-9493: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in whiteshadow Admin Menu Editor
MediumCVE-2025-9442: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in streamweasels StreamWeasels Kick Integration
MediumCVE-2025-9126: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in designful Smart Table Builder
MediumCVE-2025-8722: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pt-guy Content Views – Post Grid & Filter, Recent Posts, Category Posts … (Shortcode, Blocks, and Elementor Widgets)
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.