CVE-2025-9381: Information Disclosure in FNKvision Y215 CCTV Camera
A security flaw has been discovered in FNKvision Y215 CCTV Camera 10.194.120.40. This affects an unknown part of the file /tmp/wpa_supplicant.conf. Performing manipulation results in information disclosure. The attack may be carried out on the physical device. The attack's complexity is rated as high. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9381 is an information disclosure vulnerability identified in the FNKvision Y215 CCTV Camera running firmware version 10.194.120.40. The vulnerability involves unauthorized access to sensitive information stored in the file /tmp/wpa_supplicant.conf, which typically contains Wi-Fi configuration details including network SSIDs and potentially passwords. The flaw can be exploited by physically manipulating the device, indicating that an attacker must have direct access to the camera hardware to carry out the attack. The complexity of exploitation is rated as high, meaning that the attack requires specialized knowledge or conditions to succeed. The vulnerability does not require user interaction or network access, but does require high privileges on the device, which implies that the attacker must bypass or already have elevated permissions. The vendor, FNKvision, was notified early but has not responded or issued a patch, and no official remediation is currently available. The CVSS v4.0 base score is 1.0, reflecting a low severity primarily due to the physical access requirement and high attack complexity. However, the public release of an exploit increases the risk of targeted attacks. The vulnerability affects only the specified firmware version, and no other versions or products have been reported as impacted. The exposure of Wi-Fi credentials could facilitate further network intrusion or lateral movement if attackers gain physical access to the device, potentially compromising the broader network environment where the camera is deployed.
Potential Impact
For European organizations deploying FNKvision Y215 CCTV cameras, this vulnerability poses a limited but tangible risk. The requirement for physical access reduces the likelihood of remote exploitation, but insider threats or attackers with physical proximity could leverage this flaw to extract Wi-Fi credentials. This could lead to unauthorized network access, enabling further attacks such as data interception, lateral movement, or disruption of security monitoring systems. Organizations relying on these cameras for critical surveillance, especially in sensitive environments like government buildings, transportation hubs, or critical infrastructure, could face confidentiality breaches or operational disruptions. The lack of vendor response and patch availability prolongs exposure, increasing the window for potential exploitation. Additionally, the presence of publicly available exploits raises the risk of opportunistic attacks. Overall, while the direct impact on availability and integrity is minimal, the confidentiality compromise of network credentials can have cascading effects on organizational security posture.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls to mitigate this vulnerability. First, restrict physical access to FNKvision Y215 cameras by securing installation sites with controlled entry and surveillance to prevent unauthorized manipulation. Second, segment the network where these cameras operate, isolating them from critical systems and sensitive data to limit lateral movement if credentials are compromised. Third, regularly monitor network traffic for unusual access patterns or unauthorized devices connecting to Wi-Fi networks associated with the cameras. Fourth, consider changing Wi-Fi credentials frequently and using strong, unique passwords to reduce the value of any leaked credentials. Fifth, evaluate the feasibility of replacing or upgrading affected cameras to models with better security support. Finally, maintain an inventory of all deployed FNKvision Y215 devices and track firmware versions to identify and prioritize vulnerable units for enhanced monitoring or physical security measures.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-9381: Information Disclosure in FNKvision Y215 CCTV Camera
Description
A security flaw has been discovered in FNKvision Y215 CCTV Camera 10.194.120.40. This affects an unknown part of the file /tmp/wpa_supplicant.conf. Performing manipulation results in information disclosure. The attack may be carried out on the physical device. The attack's complexity is rated as high. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9381 is an information disclosure vulnerability identified in the FNKvision Y215 CCTV Camera running firmware version 10.194.120.40. The vulnerability involves unauthorized access to sensitive information stored in the file /tmp/wpa_supplicant.conf, which typically contains Wi-Fi configuration details including network SSIDs and potentially passwords. The flaw can be exploited by physically manipulating the device, indicating that an attacker must have direct access to the camera hardware to carry out the attack. The complexity of exploitation is rated as high, meaning that the attack requires specialized knowledge or conditions to succeed. The vulnerability does not require user interaction or network access, but does require high privileges on the device, which implies that the attacker must bypass or already have elevated permissions. The vendor, FNKvision, was notified early but has not responded or issued a patch, and no official remediation is currently available. The CVSS v4.0 base score is 1.0, reflecting a low severity primarily due to the physical access requirement and high attack complexity. However, the public release of an exploit increases the risk of targeted attacks. The vulnerability affects only the specified firmware version, and no other versions or products have been reported as impacted. The exposure of Wi-Fi credentials could facilitate further network intrusion or lateral movement if attackers gain physical access to the device, potentially compromising the broader network environment where the camera is deployed.
Potential Impact
For European organizations deploying FNKvision Y215 CCTV cameras, this vulnerability poses a limited but tangible risk. The requirement for physical access reduces the likelihood of remote exploitation, but insider threats or attackers with physical proximity could leverage this flaw to extract Wi-Fi credentials. This could lead to unauthorized network access, enabling further attacks such as data interception, lateral movement, or disruption of security monitoring systems. Organizations relying on these cameras for critical surveillance, especially in sensitive environments like government buildings, transportation hubs, or critical infrastructure, could face confidentiality breaches or operational disruptions. The lack of vendor response and patch availability prolongs exposure, increasing the window for potential exploitation. Additionally, the presence of publicly available exploits raises the risk of opportunistic attacks. Overall, while the direct impact on availability and integrity is minimal, the confidentiality compromise of network credentials can have cascading effects on organizational security posture.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls to mitigate this vulnerability. First, restrict physical access to FNKvision Y215 cameras by securing installation sites with controlled entry and surveillance to prevent unauthorized manipulation. Second, segment the network where these cameras operate, isolating them from critical systems and sensitive data to limit lateral movement if credentials are compromised. Third, regularly monitor network traffic for unusual access patterns or unauthorized devices connecting to Wi-Fi networks associated with the cameras. Fourth, consider changing Wi-Fi credentials frequently and using strong, unique passwords to reduce the value of any leaked credentials. Fifth, evaluate the feasibility of replacing or upgrading affected cameras to models with better security support. Finally, maintain an inventory of all deployed FNKvision Y215 devices and track firmware versions to identify and prioritize vulnerable units for enhanced monitoring or physical security measures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-23T15:00:08.288Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68aac39fad5a09ad002e732b
Added to database: 8/24/2025, 7:47:43 AM
Last enriched: 9/1/2025, 1:02:16 AM
Last updated: 10/8/2025, 9:35:07 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11503: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-11495: Heap-based Buffer Overflow in GNU Binutils
MediumCVE-2025-60311: n/a
HighCVE-2025-11494: Out-of-Bounds Read in GNU Binutils
MediumCVE-2025-11491: OS Command Injection in wonderwhy-er DesktopCommanderMCP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.