Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9381: Information Disclosure in FNKvision Y215 CCTV Camera

0
Low
VulnerabilityCVE-2025-9381cvecve-2025-9381
Published: Sun Aug 24 2025 (08/24/2025, 07:32:06 UTC)
Source: CVE Database V5
Vendor/Project: FNKvision
Product: Y215 CCTV Camera

Description

A security flaw has been discovered in FNKvision Y215 CCTV Camera 10.194.120.40. This affects an unknown part of the file /tmp/wpa_supplicant.conf. Performing manipulation results in information disclosure. The attack may be carried out on the physical device. The attack's complexity is rated as high. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/01/2025, 01:02:16 UTC

Technical Analysis

CVE-2025-9381 is an information disclosure vulnerability identified in the FNKvision Y215 CCTV Camera running firmware version 10.194.120.40. The vulnerability involves unauthorized access to sensitive information stored in the file /tmp/wpa_supplicant.conf, which typically contains Wi-Fi configuration details including network SSIDs and potentially passwords. The flaw can be exploited by physically manipulating the device, indicating that an attacker must have direct access to the camera hardware to carry out the attack. The complexity of exploitation is rated as high, meaning that the attack requires specialized knowledge or conditions to succeed. The vulnerability does not require user interaction or network access, but does require high privileges on the device, which implies that the attacker must bypass or already have elevated permissions. The vendor, FNKvision, was notified early but has not responded or issued a patch, and no official remediation is currently available. The CVSS v4.0 base score is 1.0, reflecting a low severity primarily due to the physical access requirement and high attack complexity. However, the public release of an exploit increases the risk of targeted attacks. The vulnerability affects only the specified firmware version, and no other versions or products have been reported as impacted. The exposure of Wi-Fi credentials could facilitate further network intrusion or lateral movement if attackers gain physical access to the device, potentially compromising the broader network environment where the camera is deployed.

Potential Impact

For European organizations deploying FNKvision Y215 CCTV cameras, this vulnerability poses a limited but tangible risk. The requirement for physical access reduces the likelihood of remote exploitation, but insider threats or attackers with physical proximity could leverage this flaw to extract Wi-Fi credentials. This could lead to unauthorized network access, enabling further attacks such as data interception, lateral movement, or disruption of security monitoring systems. Organizations relying on these cameras for critical surveillance, especially in sensitive environments like government buildings, transportation hubs, or critical infrastructure, could face confidentiality breaches or operational disruptions. The lack of vendor response and patch availability prolongs exposure, increasing the window for potential exploitation. Additionally, the presence of publicly available exploits raises the risk of opportunistic attacks. Overall, while the direct impact on availability and integrity is minimal, the confidentiality compromise of network credentials can have cascading effects on organizational security posture.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement compensating controls to mitigate this vulnerability. First, restrict physical access to FNKvision Y215 cameras by securing installation sites with controlled entry and surveillance to prevent unauthorized manipulation. Second, segment the network where these cameras operate, isolating them from critical systems and sensitive data to limit lateral movement if credentials are compromised. Third, regularly monitor network traffic for unusual access patterns or unauthorized devices connecting to Wi-Fi networks associated with the cameras. Fourth, consider changing Wi-Fi credentials frequently and using strong, unique passwords to reduce the value of any leaked credentials. Fifth, evaluate the feasibility of replacing or upgrading affected cameras to models with better security support. Finally, maintain an inventory of all deployed FNKvision Y215 devices and track firmware versions to identify and prioritize vulnerable units for enhanced monitoring or physical security measures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-23T15:00:08.288Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68aac39fad5a09ad002e732b

Added to database: 8/24/2025, 7:47:43 AM

Last enriched: 9/1/2025, 1:02:16 AM

Last updated: 10/8/2025, 9:35:07 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats