Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22755: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Vivotek Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330

0
Critical
VulnerabilityCVE-2026-22755cvecve-2026-22755cwe-77
Published: Tue Jan 13 2026 (01/13/2026, 15:12:53 UTC)
Source: CVE Database V5
Vendor/Project: Vivotek
Product: Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330

Description

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Vivotek Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330 (Firmware modules) allows OS Command Injection.This issue affects Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330: 0100a, 0106a, 0106b, 0107a, 0107b_1, 0109a, 0112a, 0113a, 0113d, 0117b, 0119e, 0120b, 0121, 0121d, 0121d_48573_1, 0122e, 0124d_48573_1, 012501, 012502, 0125c.

AI-Powered Analysis

AILast updated: 01/13/2026, 15:41:30 UTC

Technical Analysis

CVE-2026-22755 is a critical vulnerability classified under CWE-77 (Improper Neutralization of Special Elements used in a Command, i.e., Command Injection) affecting a broad range of Vivotek IP camera models and firmware versions. The vulnerability stems from insufficient sanitization of user-supplied input that is incorporated into OS-level commands within the device firmware modules. This flaw enables remote attackers to inject and execute arbitrary operating system commands without requiring authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N). The affected models include FD8365 series, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391, FE9180 series, IB9365 series, IP9165 series, IT9389, MA9321/MA9322, MS9321/MS9390, and TB9330, across multiple firmware versions from 0100a through 0125c. The vulnerability allows attackers to gain full control over the device, potentially leading to unauthorized surveillance, lateral movement within networks, and disruption of security monitoring. While no public exploits have been reported yet, the critical severity and ease of exploitation make it a high-risk threat. The vulnerability affects the confidentiality, integrity, and availability of the devices and any connected systems relying on them. The lack of authentication and user interaction requirements further exacerbate the risk. The vulnerability was published on January 13, 2026, with no patches currently linked, emphasizing the need for immediate attention from users and administrators of these devices.

Potential Impact

For European organizations, the impact of CVE-2026-22755 is significant due to the widespread use of Vivotek IP cameras in corporate, governmental, and critical infrastructure environments. Exploitation can lead to unauthorized access to video feeds, compromising privacy and security monitoring capabilities. Attackers could manipulate or disable surveillance systems, undermining physical security and potentially facilitating further attacks. The ability to execute arbitrary OS commands can allow attackers to pivot into internal networks, escalate privileges, and exfiltrate sensitive data. This poses a threat to sectors such as transportation, energy, finance, and public safety, where surveillance integrity is paramount. Additionally, disruption of these devices can cause operational downtime and damage organizational reputation. The vulnerability's remote and unauthenticated nature increases the likelihood of exploitation, especially in environments where these devices are internet-facing or insufficiently segmented. The absence of known exploits currently provides a window for mitigation, but the critical severity demands urgent action to prevent potential attacks.

Mitigation Recommendations

1. Immediate firmware updates: Monitor Vivotek's official channels for patches addressing CVE-2026-22755 and apply them promptly once released. 2. Network segmentation: Isolate Vivotek devices on dedicated VLANs or subnets with strict firewall rules to limit exposure to untrusted networks. 3. Access control: Restrict management interfaces to trusted IP addresses and enforce strong authentication mechanisms where possible. 4. Disable unnecessary services: Turn off any non-essential services or features on the affected devices to reduce attack surface. 5. Monitoring and logging: Implement continuous monitoring for unusual command execution patterns or network traffic anomalies related to these devices. 6. Incident response readiness: Prepare response plans for potential compromise scenarios involving these cameras. 7. Vendor engagement: Engage with Vivotek support for guidance and to confirm patch availability and deployment best practices. 8. Physical security: Ensure physical access to devices is controlled to prevent local exploitation. 9. Inventory management: Maintain an accurate inventory of all affected devices and firmware versions deployed within the organization to prioritize remediation efforts. 10. Disable remote access: Where feasible, disable remote management interfaces accessible from the internet until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
larry_cashdollar
Date Reserved
2026-01-09T14:27:11.646Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69666427a60475309f6cdbe4

Added to database: 1/13/2026, 3:26:31 PM

Last enriched: 1/13/2026, 3:41:30 PM

Last updated: 1/13/2026, 6:53:24 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats