Skip to main content

CVE-2025-7724: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. VIGI NVR1104H-4P V1

High
VulnerabilityCVE-2025-7724cvecve-2025-7724cwe-78
Published: Tue Jul 22 2025 (07/22/2025, 20:43:18 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: VIGI NVR1104H-4P V1

Description

An unauthenticated OS command injection vulnerability exists in VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2.This issue affects VIGI NVR1104H-4P V1: before 1.1.5 Build 250518; VIGI NVR2016H-16MP V2: before 1.3.1 Build 250407.

AI-Powered Analysis

AILast updated: 07/30/2025, 01:28:36 UTC

Technical Analysis

CVE-2025-7724 is a high-severity OS command injection vulnerability identified in TP-Link Systems Inc.'s VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2 network video recorders (NVRs). The vulnerability arises due to improper neutralization of special elements used in OS commands (CWE-78), allowing an unauthenticated attacker to inject arbitrary OS commands. This flaw affects VIGI NVR1104H-4P V1 versions prior to 1.1.5 Build 250518 and VIGI NVR2016H-16MP V2 versions prior to 1.3.1 Build 250407. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector string (CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) shows that the attack requires adjacent network access (AV:A), has low attack complexity (AC:L), requires no authentication (PR:N), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level. Exploitation could allow attackers to execute arbitrary commands on the device's underlying operating system, potentially leading to full device compromise, data exfiltration, or disruption of video surveillance functions. No known exploits are currently reported in the wild, but the lack of authentication and ease of exploitation make this a critical concern for affected deployments. The absence of patch links suggests that fixes may not yet be publicly available or fully disseminated, increasing the urgency for mitigation and monitoring. Given the role of these NVRs in security infrastructure, exploitation could undermine physical security monitoring and incident response capabilities.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for entities relying on TP-Link VIGI NVR devices for video surveillance and security monitoring. Compromise of these devices could lead to unauthorized access to video feeds, manipulation or deletion of recorded footage, and disruption of security operations. This could have cascading effects on physical security, regulatory compliance (e.g., GDPR concerns regarding video data confidentiality), and operational continuity. Critical infrastructure sectors such as transportation hubs, government facilities, healthcare institutions, and corporate campuses using these NVRs are particularly vulnerable. Furthermore, the unauthenticated nature of the vulnerability increases the risk of remote exploitation from within internal networks or adjacent network segments, which are common in enterprise environments. The potential for attackers to gain persistent footholds or pivot to other internal systems elevates the threat level. The high confidentiality, integrity, and availability impact ratings underscore the severity of potential damage to European organizations’ security posture.

Mitigation Recommendations

1. Immediate network segmentation: Isolate affected NVR devices from general network access, restricting communication to only trusted management hosts and monitoring systems. 2. Apply vendor patches promptly once available: Monitor TP-Link advisories and update firmware to versions 1.1.5 Build 250518 or later for VIGI NVR1104H-4P V1 and 1.3.1 Build 250407 or later for VIGI NVR2016H-16MP V2. 3. Implement strict access controls: Limit network access to NVR management interfaces using firewalls, VPNs, or zero-trust network access solutions to prevent unauthorized access. 4. Monitor network traffic for anomalous commands or unusual activity targeting NVR devices, using IDS/IPS systems tuned for command injection patterns. 5. Disable or restrict unnecessary services and interfaces on the NVR devices to reduce attack surface. 6. Conduct regular security audits and penetration testing focusing on IoT and surveillance devices to detect similar vulnerabilities proactively. 7. Establish incident response plans specific to surveillance infrastructure compromise, including forensic readiness and rapid device isolation procedures. These measures go beyond generic advice by emphasizing network architecture changes, proactive monitoring, and operational readiness tailored to the unique role of NVR devices in security environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TPLink
Date Reserved
2025-07-16T17:55:23.376Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687ff9c9a915ff00f7fb1811

Added to database: 7/22/2025, 8:51:21 PM

Last enriched: 7/30/2025, 1:28:36 AM

Last updated: 9/4/2025, 9:50:07 PM

Views: 38

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats