Skip to main content

CVE-2025-9382: Backdoor in FNKvision Y215 CCTV Camera

Medium
VulnerabilityCVE-2025-9382cvecve-2025-9382
Published: Sun Aug 24 2025 (08/24/2025, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: FNKvision
Product: Y215 CCTV Camera

Description

A weakness has been identified in FNKvision Y215 CCTV Camera 10.194.120.40. This vulnerability affects unknown code of the file s1_rf_test_config of the component Telnet Sevice. Executing manipulation can lead to backdoor. The physical device can be targeted for the attack. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/24/2025, 08:32:44 UTC

Technical Analysis

CVE-2025-9382 is a medium-severity vulnerability identified in the FNKvision Y215 CCTV Camera, specifically affecting version 10.194.120.40. The weakness resides in an unknown code segment within the s1_rf_test_config file of the Telnet Service component. Exploitation of this vulnerability can lead to the installation or activation of a backdoor on the physical device. The attack vector requires physical access to the device, and the complexity of exploitation is high, indicating that it is not trivial to execute. The vulnerability does not require authentication or user interaction, but the attack complexity and physical access requirement limit its ease of exploitation. The CVSS 4.0 score is 5.4 (medium), reflecting the moderate risk posed by this vulnerability. The vendor, FNKvision, was contacted early but did not respond or provide a patch, and no official remediation is currently available. Although the exploit code has been made public, there are no known exploits in the wild at this time. The vulnerability impacts the confidentiality, integrity, and availability of the CCTV camera, as a backdoor could allow unauthorized remote control, surveillance, or disruption of the device's operation. The Telnet service, often considered insecure, is a critical attack surface here, and the presence of a backdoor could enable attackers to bypass normal security controls.

Potential Impact

For European organizations, especially those relying on FNKvision Y215 CCTV cameras for physical security and surveillance, this vulnerability poses a significant risk. A backdoor could allow attackers to gain unauthorized access to surveillance footage, potentially compromising sensitive information or violating privacy regulations such as GDPR. The integrity of security monitoring could be undermined, allowing attackers to disable or manipulate camera feeds without detection. Availability could also be affected if attackers disrupt the device's operation. Given the physical access requirement, insider threats or attackers with physical proximity to the device are the most likely vectors. Critical infrastructure, government facilities, and enterprises using these cameras for security monitoring could face operational disruptions and reputational damage. The lack of vendor response and patches increases the risk exposure, as organizations cannot rely on official fixes and must implement compensating controls.

Mitigation Recommendations

1. Physically secure all FNKvision Y215 CCTV cameras to prevent unauthorized physical access, including locked enclosures and restricted access areas. 2. Disable the Telnet service on the devices if possible, or isolate the cameras on a segmented network with strict access controls to limit exposure. 3. Monitor network traffic for unusual activity related to the cameras, especially attempts to access Telnet or unexpected outbound connections that could indicate backdoor communication. 4. Implement strict access control policies and logging for any physical or network access to the cameras. 5. Consider replacing affected devices with models from vendors that provide timely security updates and have a better security track record. 6. If replacement is not immediately feasible, deploy network-based intrusion detection/prevention systems (IDS/IPS) to detect and block exploitation attempts. 7. Regularly audit and review device firmware versions and configurations to identify and mitigate vulnerabilities proactively. 8. Educate staff about the risks of physical tampering and the importance of reporting suspicious activity around security devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-23T15:00:11.035Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68aacaa7ad5a09ad002e8f98

Added to database: 8/24/2025, 8:17:43 AM

Last enriched: 8/24/2025, 8:32:44 AM

Last updated: 8/24/2025, 10:41:03 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats