Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7724: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. VIGI NVR1104H-4P V1

0
High
VulnerabilityCVE-2025-7724cvecve-2025-7724cwe-78
Published: Tue Jul 22 2025 (07/22/2025, 20:43:18 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: VIGI NVR1104H-4P V1

Description

An unauthenticated OS command injection vulnerability exists in VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2.This issue affects VIGI NVR1104H-4P V1: before 1.1.5 Build 250518; VIGI NVR2016H-16MP V2: before 1.3.1 Build 250407.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:18:11 UTC

Technical Analysis

CVE-2025-7724 is an OS command injection vulnerability identified in TP-Link's VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2 network video recorders. The root cause is improper neutralization of special characters in OS commands (CWE-78), allowing unauthenticated remote attackers to inject and execute arbitrary operating system commands on affected devices. This vulnerability affects firmware versions prior to 1.1.5 Build 250518 for VIGI NVR1104H-4P V1 and prior to 1.3.1 Build 250407 for VIGI NVR2016H-16MP V2. The CVSS 4.0 vector indicates the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (all high). This means an attacker on the same local network or connected network segment can exploit this vulnerability without authentication or user interaction, potentially gaining full control over the device. The vulnerability could be leveraged to disrupt video surveillance operations, exfiltrate sensitive video data, or pivot to other internal network systems. No public exploits have been reported yet, but the severity and ease of exploitation make it a critical concern for organizations using these devices. The lack of available patches at the time of disclosure necessitates immediate mitigation through network controls and monitoring.

Potential Impact

The impact of CVE-2025-7724 is substantial for organizations deploying affected TP-Link VIGI NVR devices. Successful exploitation can lead to complete compromise of the network video recorder, allowing attackers to execute arbitrary commands with system-level privileges. This can result in unauthorized access to sensitive surveillance footage, disruption or destruction of video recording capabilities, and potential lateral movement within the network to compromise additional systems. The confidentiality of recorded video data is at risk, as is the integrity and availability of surveillance services critical for physical security. Organizations relying on these devices for security monitoring, especially in sectors like government, critical infrastructure, transportation, and enterprise environments, face increased risk of espionage, sabotage, or operational disruption. The unauthenticated nature of the vulnerability and lack of required user interaction increase the likelihood of exploitation, particularly in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks.

Mitigation Recommendations

1. Immediately isolate affected TP-Link VIGI NVR devices from untrusted networks and restrict access to trusted administrators only. 2. Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from these devices. 3. Implement strict network segmentation to limit exposure of NVR devices to only necessary management and monitoring systems. 4. Disable any unnecessary services or interfaces on the devices to reduce the attack surface. 5. Regularly check TP-Link’s official channels for firmware updates addressing this vulnerability and apply patches promptly once released. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting OS command injection attempts targeting these devices. 7. Conduct thorough security audits of all network video recorders and related IoT devices to identify and remediate similar vulnerabilities. 8. Consider deploying compensating controls such as application-layer firewalls or reverse proxies to sanitize inputs and block malicious payloads targeting the NVR management interfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
TPLink
Date Reserved
2025-07-16T17:55:23.376Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687ff9c9a915ff00f7fb1811

Added to database: 7/22/2025, 8:51:21 PM

Last enriched: 2/27/2026, 4:18:11 AM

Last updated: 3/24/2026, 4:18:37 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses