Skip to main content

CVE-2025-9380: Hard-coded Credentials in FNKvision Y215 CCTV Camera

High
VulnerabilityCVE-2025-9380cvecve-2025-9380
Published: Sun Aug 24 2025 (08/24/2025, 07:02:07 UTC)
Source: CVE Database V5
Vendor/Project: FNKvision
Product: Y215 CCTV Camera

Description

A vulnerability was identified in FNKvision Y215 CCTV Camera 10.194.120.40. Affected by this issue is some unknown functionality of the file /etc/passwd of the component Firmware. Such manipulation leads to hard-coded credentials. Local access is required to approach this attack. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/24/2025, 07:32:47 UTC

Technical Analysis

CVE-2025-9380 is a high-severity vulnerability affecting the FNKvision Y215 CCTV Camera firmware version 10.194.120.40. The issue stems from hard-coded credentials embedded within the device's firmware, specifically related to the /etc/passwd file or its handling. This vulnerability requires local access to the device to exploit, meaning an attacker must have some form of direct or network-level access that allows interaction with the device's filesystem or operating system environment. The presence of hard-coded credentials can allow an attacker with local access to bypass authentication mechanisms, potentially gaining elevated privileges or unauthorized control over the device. The CVSS 4.0 score of 8.5 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The vulnerability does not require authentication to exploit once local access is obtained, and the scope is limited to the affected firmware version. The vendor has not responded to disclosure attempts, and no patches are currently available. Although no known exploits are reported in the wild, a public exploit exists, increasing the risk of exploitation. This vulnerability is critical in environments where physical or network access to the CCTV camera is possible, as it could lead to unauthorized surveillance, manipulation of video feeds, or use of the device as a pivot point for further network intrusion.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for sectors relying heavily on CCTV for security such as critical infrastructure, transportation, government facilities, and corporate offices. Exploitation could lead to unauthorized access to surveillance footage, compromising privacy and security. Attackers could manipulate or disable cameras, undermining physical security controls. Additionally, compromised cameras could serve as entry points for lateral movement within enterprise networks, potentially exposing sensitive data or disrupting operations. The lack of vendor response and patches increases the window of exposure. Organizations with FNKvision Y215 cameras deployed in sensitive or high-risk locations face elevated threats of espionage, sabotage, or data breaches. Given the local access requirement, attackers might exploit weak network segmentation or physical access vulnerabilities to reach the device. The high confidentiality, integrity, and availability impact means that exploitation could severely damage organizational security posture and trust.

Mitigation Recommendations

1. Immediate network segmentation: Isolate FNKvision Y215 cameras on dedicated VLANs with strict access controls to limit local access opportunities. 2. Implement strong physical security controls to prevent unauthorized physical access to devices. 3. Monitor network traffic for unusual activity originating from or targeting these cameras, including attempts to access device management interfaces. 4. Disable or restrict unused services and interfaces on the cameras to reduce attack surface. 5. Employ network-level authentication and encryption where possible to protect device communications. 6. Maintain an inventory of all FNKvision Y215 devices and track firmware versions to identify affected units. 7. Engage with FNKvision or authorized resellers to seek firmware updates or patches; if unavailable, consider replacing affected devices with more secure alternatives. 8. Use intrusion detection systems (IDS) and endpoint detection and response (EDR) tools to detect exploitation attempts. 9. Regularly audit device configurations and logs for signs of compromise. 10. Educate security and IT staff about this vulnerability to ensure rapid response if exploitation is suspected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-23T15:00:05.300Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68aabc97ad5a09ad002e532d

Added to database: 8/24/2025, 7:17:43 AM

Last enriched: 8/24/2025, 7:32:47 AM

Last updated: 8/24/2025, 12:00:17 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats