CVE-2026-0855: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Merit LILIN P2
Certain IP Camera models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.
AI Analysis
Technical Summary
CVE-2026-0855 is an OS Command Injection vulnerability classified under CWE-78, discovered in certain models of Merit LILIN P2 IP cameras. This vulnerability allows an authenticated remote attacker to inject arbitrary OS commands that the device executes with elevated privileges. The flaw arises from improper neutralization of special elements in user-supplied input before passing them to the underlying operating system command interpreter. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and requiring privileges (PR:L). The impact metrics indicate high confidentiality, integrity, and availability impacts, meaning an attacker could fully control the device, exfiltrate sensitive data, manipulate camera feeds, or disrupt device functionality. Although no public exploits are currently reported, the vulnerability's characteristics make it a prime target for attackers seeking to compromise surveillance infrastructure. The affected product, Merit LILIN P2, is used in various security and monitoring deployments, making this vulnerability particularly concerning for environments relying on these cameras for safety and operational monitoring. The lack of available patches at the time of disclosure increases the urgency for defensive measures.
Potential Impact
For European organizations, this vulnerability poses a significant threat to physical security and operational continuity. Compromise of IP cameras can lead to unauthorized surveillance, data leakage, and potential pivot points for lateral movement within networks. Critical infrastructure, government facilities, and enterprises relying on Merit LILIN P2 cameras for security monitoring could face espionage, sabotage, or disruption of services. The ability to execute arbitrary OS commands means attackers could disable cameras, manipulate video feeds, or use the compromised devices as footholds to launch further attacks. This could undermine trust in security systems and cause regulatory compliance issues under GDPR and other data protection laws due to potential exposure of personal data captured by cameras. The high severity and ease of exploitation increase the risk profile, especially in sectors with high security demands.
Mitigation Recommendations
1. Immediately restrict network access to Merit LILIN P2 cameras by placing them behind firewalls or network segmentation to limit exposure to trusted administrators only. 2. Enforce strong authentication mechanisms and regularly update credentials to reduce the risk of unauthorized access. 3. Monitor network traffic and device logs for unusual command execution patterns or access attempts indicative of exploitation. 4. Engage with Merit LILIN support channels to obtain and apply security patches or firmware updates as soon as they become available. 5. If patches are delayed, consider temporary mitigations such as disabling remote management interfaces or using VPNs for secure access. 6. Conduct regular security assessments and penetration tests focusing on IP camera infrastructure to identify and remediate vulnerabilities proactively. 7. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection attempts targeting these devices. 8. Maintain an inventory of all deployed Merit LILIN P2 cameras to prioritize patching and monitoring efforts effectively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2026-0855: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Merit LILIN P2
Description
Certain IP Camera models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.
AI-Powered Analysis
Technical Analysis
CVE-2026-0855 is an OS Command Injection vulnerability classified under CWE-78, discovered in certain models of Merit LILIN P2 IP cameras. This vulnerability allows an authenticated remote attacker to inject arbitrary OS commands that the device executes with elevated privileges. The flaw arises from improper neutralization of special elements in user-supplied input before passing them to the underlying operating system command interpreter. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and requiring privileges (PR:L). The impact metrics indicate high confidentiality, integrity, and availability impacts, meaning an attacker could fully control the device, exfiltrate sensitive data, manipulate camera feeds, or disrupt device functionality. Although no public exploits are currently reported, the vulnerability's characteristics make it a prime target for attackers seeking to compromise surveillance infrastructure. The affected product, Merit LILIN P2, is used in various security and monitoring deployments, making this vulnerability particularly concerning for environments relying on these cameras for safety and operational monitoring. The lack of available patches at the time of disclosure increases the urgency for defensive measures.
Potential Impact
For European organizations, this vulnerability poses a significant threat to physical security and operational continuity. Compromise of IP cameras can lead to unauthorized surveillance, data leakage, and potential pivot points for lateral movement within networks. Critical infrastructure, government facilities, and enterprises relying on Merit LILIN P2 cameras for security monitoring could face espionage, sabotage, or disruption of services. The ability to execute arbitrary OS commands means attackers could disable cameras, manipulate video feeds, or use the compromised devices as footholds to launch further attacks. This could undermine trust in security systems and cause regulatory compliance issues under GDPR and other data protection laws due to potential exposure of personal data captured by cameras. The high severity and ease of exploitation increase the risk profile, especially in sectors with high security demands.
Mitigation Recommendations
1. Immediately restrict network access to Merit LILIN P2 cameras by placing them behind firewalls or network segmentation to limit exposure to trusted administrators only. 2. Enforce strong authentication mechanisms and regularly update credentials to reduce the risk of unauthorized access. 3. Monitor network traffic and device logs for unusual command execution patterns or access attempts indicative of exploitation. 4. Engage with Merit LILIN support channels to obtain and apply security patches or firmware updates as soon as they become available. 5. If patches are delayed, consider temporary mitigations such as disabling remote management interfaces or using VPNs for secure access. 6. Conduct regular security assessments and penetration tests focusing on IP camera infrastructure to identify and remediate vulnerabilities proactively. 7. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection attempts targeting these devices. 8. Maintain an inventory of all deployed Merit LILIN P2 cameras to prioritize patching and monitoring efforts effectively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- twcert
- Date Reserved
- 2026-01-12T03:07:26.033Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69649dfdda2266e838104fce
Added to database: 1/12/2026, 7:08:45 AM
Last enriched: 1/19/2026, 7:23:42 PM
Last updated: 2/7/2026, 1:52:07 PM
Views: 103
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.