CVE-2025-14747

4.3 MEDIUM

📋 TL;DR

This vulnerability allows an attacker on the local network to send a malformed RTSP Describe request to the Ningyuanda TC155 device, causing a denial of service. The exploit is publicly available and affects version 57.0.2.0 of the device's RTSP service. Only devices on the same local network are vulnerable.

💻 Affected Systems

Products:
  • Ningyuanda TC155
Versions: 57.0.2.0
Operating Systems: Embedded/IoT OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with RTSP service enabled and accessible on local network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical restart, disrupting all RTSP streaming services and potentially affecting other device functions.

🟠

Likely Case

RTSP service becomes unresponsive, interrupting video streaming functionality until service restart.

🟢

If Mitigated

Minimal impact if network segmentation isolates the device from untrusted local networks.

🌐 Internet-Facing: LOW - Attack must originate from local network, not directly internet exploitable.
🏢 Internal Only: MEDIUM - Local network access required, but exploit is public and unauthenticated.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub, requires only network access and basic scripting knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Monitor vendor website for updates.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate TC155 devices on separate VLAN or network segment from untrusted devices.

RTSP Service Restriction

all

Configure firewall to restrict RTSP traffic to only trusted IP addresses.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which devices can communicate with TC155 RTSP service.
  • Monitor network traffic for malformed RTSP requests and implement automated alerting.

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface or serial console. If version is 57.0.2.0 and RTSP service is enabled, device is vulnerable.

Check Version:

Check device web interface at http://[device-ip]/ or use serial console connection.

Verify Fix Applied:

No fix available to verify. Workarounds can be tested by attempting exploitation from restricted networks.

📡 Detection & Monitoring

Log Indicators:

  • RTSP service crash logs
  • Malformed RTSP Describe request patterns in application logs

Network Indicators:

  • Unusual RTSP traffic from local network devices
  • RTSP Describe requests with malformed headers

SIEM Query:

source="network_traffic" protocol="RTSP" method="DESCRIBE" AND (header_length>normal OR malformed_packet=true)

🔗 References

📤 Share & Export