CVE-2026-22755: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Vivotek Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Vivotek Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330 (Firmware modules) allows OS Command Injection.This issue affects Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330: 0100a, 0106a, 0106b, 0107a, 0107b_1, 0109a, 0112a, 0113a, 0113d, 0117b, 0119e, 0120b, 0121, 0121d, 0121d_48573_1, 0122e, 0124d_48573_1, 012501, 012502, 0125c.
AI Analysis
Technical Summary
CVE-2026-22755 is a critical vulnerability classified under CWE-77 (Improper Neutralization of Special Elements used in a Command, i.e., Command Injection) affecting a broad range of Vivotek IP camera models and firmware versions. The vulnerability stems from insufficient sanitization of user-supplied input that is incorporated into OS-level commands within the device firmware modules. This flaw enables remote attackers to inject and execute arbitrary operating system commands without requiring authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N). The affected models include FD8365 series, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391, FE9180 series, IB9365 series, IP9165 series, IT9389, MA9321/MA9322, MS9321/MS9390, and TB9330, across multiple firmware versions from 0100a through 0125c. The vulnerability allows attackers to gain full control over the device, potentially leading to unauthorized surveillance, lateral movement within networks, and disruption of security monitoring. While no public exploits have been reported yet, the critical severity and ease of exploitation make it a high-risk threat. The vulnerability affects the confidentiality, integrity, and availability of the devices and any connected systems relying on them. The lack of authentication and user interaction requirements further exacerbate the risk. The vulnerability was published on January 13, 2026, with no patches currently linked, emphasizing the need for immediate attention from users and administrators of these devices.
Potential Impact
For European organizations, the impact of CVE-2026-22755 is significant due to the widespread use of Vivotek IP cameras in corporate, governmental, and critical infrastructure environments. Exploitation can lead to unauthorized access to video feeds, compromising privacy and security monitoring capabilities. Attackers could manipulate or disable surveillance systems, undermining physical security and potentially facilitating further attacks. The ability to execute arbitrary OS commands can allow attackers to pivot into internal networks, escalate privileges, and exfiltrate sensitive data. This poses a threat to sectors such as transportation, energy, finance, and public safety, where surveillance integrity is paramount. Additionally, disruption of these devices can cause operational downtime and damage organizational reputation. The vulnerability's remote and unauthenticated nature increases the likelihood of exploitation, especially in environments where these devices are internet-facing or insufficiently segmented. The absence of known exploits currently provides a window for mitigation, but the critical severity demands urgent action to prevent potential attacks.
Mitigation Recommendations
1. Immediate firmware updates: Monitor Vivotek's official channels for patches addressing CVE-2026-22755 and apply them promptly once released. 2. Network segmentation: Isolate Vivotek devices on dedicated VLANs or subnets with strict firewall rules to limit exposure to untrusted networks. 3. Access control: Restrict management interfaces to trusted IP addresses and enforce strong authentication mechanisms where possible. 4. Disable unnecessary services: Turn off any non-essential services or features on the affected devices to reduce attack surface. 5. Monitoring and logging: Implement continuous monitoring for unusual command execution patterns or network traffic anomalies related to these devices. 6. Incident response readiness: Prepare response plans for potential compromise scenarios involving these cameras. 7. Vendor engagement: Engage with Vivotek support for guidance and to confirm patch availability and deployment best practices. 8. Physical security: Ensure physical access to devices is controlled to prevent local exploitation. 9. Inventory management: Maintain an accurate inventory of all affected devices and firmware versions deployed within the organization to prioritize remediation efforts. 10. Disable remote access: Where feasible, disable remote management interfaces accessible from the internet until patches are applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Austria
CVE-2026-22755: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Vivotek Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330
Description
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Vivotek Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330 (Firmware modules) allows OS Command Injection.This issue affects Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330: 0100a, 0106a, 0106b, 0107a, 0107b_1, 0109a, 0112a, 0113a, 0113d, 0117b, 0119e, 0120b, 0121, 0121d, 0121d_48573_1, 0122e, 0124d_48573_1, 012501, 012502, 0125c.
AI-Powered Analysis
Technical Analysis
CVE-2026-22755 is a critical vulnerability classified under CWE-77 (Improper Neutralization of Special Elements used in a Command, i.e., Command Injection) affecting a broad range of Vivotek IP camera models and firmware versions. The vulnerability stems from insufficient sanitization of user-supplied input that is incorporated into OS-level commands within the device firmware modules. This flaw enables remote attackers to inject and execute arbitrary operating system commands without requiring authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N). The affected models include FD8365 series, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391, FE9180 series, IB9365 series, IP9165 series, IT9389, MA9321/MA9322, MS9321/MS9390, and TB9330, across multiple firmware versions from 0100a through 0125c. The vulnerability allows attackers to gain full control over the device, potentially leading to unauthorized surveillance, lateral movement within networks, and disruption of security monitoring. While no public exploits have been reported yet, the critical severity and ease of exploitation make it a high-risk threat. The vulnerability affects the confidentiality, integrity, and availability of the devices and any connected systems relying on them. The lack of authentication and user interaction requirements further exacerbate the risk. The vulnerability was published on January 13, 2026, with no patches currently linked, emphasizing the need for immediate attention from users and administrators of these devices.
Potential Impact
For European organizations, the impact of CVE-2026-22755 is significant due to the widespread use of Vivotek IP cameras in corporate, governmental, and critical infrastructure environments. Exploitation can lead to unauthorized access to video feeds, compromising privacy and security monitoring capabilities. Attackers could manipulate or disable surveillance systems, undermining physical security and potentially facilitating further attacks. The ability to execute arbitrary OS commands can allow attackers to pivot into internal networks, escalate privileges, and exfiltrate sensitive data. This poses a threat to sectors such as transportation, energy, finance, and public safety, where surveillance integrity is paramount. Additionally, disruption of these devices can cause operational downtime and damage organizational reputation. The vulnerability's remote and unauthenticated nature increases the likelihood of exploitation, especially in environments where these devices are internet-facing or insufficiently segmented. The absence of known exploits currently provides a window for mitigation, but the critical severity demands urgent action to prevent potential attacks.
Mitigation Recommendations
1. Immediate firmware updates: Monitor Vivotek's official channels for patches addressing CVE-2026-22755 and apply them promptly once released. 2. Network segmentation: Isolate Vivotek devices on dedicated VLANs or subnets with strict firewall rules to limit exposure to untrusted networks. 3. Access control: Restrict management interfaces to trusted IP addresses and enforce strong authentication mechanisms where possible. 4. Disable unnecessary services: Turn off any non-essential services or features on the affected devices to reduce attack surface. 5. Monitoring and logging: Implement continuous monitoring for unusual command execution patterns or network traffic anomalies related to these devices. 6. Incident response readiness: Prepare response plans for potential compromise scenarios involving these cameras. 7. Vendor engagement: Engage with Vivotek support for guidance and to confirm patch availability and deployment best practices. 8. Physical security: Ensure physical access to devices is controlled to prevent local exploitation. 9. Inventory management: Maintain an accurate inventory of all affected devices and firmware versions deployed within the organization to prioritize remediation efforts. 10. Disable remote access: Where feasible, disable remote management interfaces accessible from the internet until patches are applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- larry_cashdollar
- Date Reserved
- 2026-01-09T14:27:11.646Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69666427a60475309f6cdbe4
Added to database: 1/13/2026, 3:26:31 PM
Last enriched: 1/13/2026, 3:41:30 PM
Last updated: 1/13/2026, 6:53:24 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21274: Incorrect Authorization (CWE-863) in Adobe Dreamweaver Desktop
HighCVE-2026-21272: Improper Input Validation (CWE-20) in Adobe Dreamweaver Desktop
HighCVE-2026-21271: Improper Input Validation (CWE-20) in Adobe Dreamweaver Desktop
HighCVE-2026-21268: Improper Input Validation (CWE-20) in Adobe Dreamweaver Desktop
HighCVE-2026-21267: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78) in Adobe Dreamweaver Desktop
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.