EUVD-2025-18247

| CVE-2025-39240 HIGH
2025-06-13 [email protected]
7.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 21:34 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:34 euvd
EUVD-2025-18247
CVE Published
Jun 13, 2025 - 08:15 nvd
HIGH 7.2

Description

Some Hikvision Wireless Access Point are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.

Analysis

CVE-2025-39240 is an authenticated remote command execution vulnerability in Hikvision Wireless Access Points caused by insufficient input validation in packet handling. Attackers with valid credentials can send crafted packets to execute arbitrary commands on affected devices, potentially achieving full system compromise. The vulnerability has a CVSS 7.2 score reflecting high confidentiality, integrity, and availability impact, though it requires valid authentication credentials to exploit.

Technical Context

This vulnerability resides in Hikvision Wireless Access Point firmware and affects the command processing pipeline. The root cause is CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that user-supplied input from authenticated API/packet handlers is passed unsanitized to OS command execution functions (likely via system() or equivalent calls). The vulnerability exists in network-facing services that accept authenticated connections, processing malformed packets without proper input validation or sanitization. Affected CPE pattern: cpe:2.3:a:hikvision:wireless_access_point:*:*:*:*:*:*:*:* (specific version ranges to be determined from vendor advisory). The attack surface includes device management interfaces, API endpoints, or protocol handlers that parse incoming packets from authenticated users.

Affected Products

Product: Hikvision Wireless Access Point (specific model/SKU information not provided in CVE description; vendor advisory required for complete list). Affected versions: Not specified in description—assume multiple firmware versions until advisory published. CPE representation: cpe:2.3:h:hikvision:wireless_access_point:*:*:*:*:*:*:*:* (hardware) and cpe:2.3:o:hikvision:wireless_access_point_firmware:*:*:*:*:*:*:*:* (firmware). Impacted configurations: Any Hikvision WAP deployed with network-accessible management interfaces and user accounts with API/command privileges. Recommendation: Consult official Hikvision Security Advisory (publish date expected ~2025) for exact model numbers, firmware version ranges, and patch availability.

Remediation

Immediate Actions: (1) Apply firmware patches released by Hikvision (version numbers to be provided in official advisory; monitor Hikvision support portal and CISA alerts). (2) Restrict network access to WAP management interfaces using firewall rules—limit to trusted administrative subnets only. (3) Enforce strong authentication: disable default credentials, enforce complex passwords, and implement multi-factor authentication on device APIs if available. (4) Monitor device logs for suspicious authenticated API calls or command patterns. (5) Segment wireless infrastructure from critical systems. Workarounds (pre-patch): (a) Disable remote management features if not required (CLI/API). (b) Use VPN or bastion hosts for all device administration. (c) Implement rate limiting and IDS signatures for malformed packet detection. (d) Audit user accounts and revoke unnecessary privileges. Long-term: Subscribe to Hikvision security bulletins, establish patch management procedures for network infrastructure, and conduct periodic privilege access reviews.

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +36
POC: 0

Share

EUVD-2025-18247 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy