CVE-2025-14747
📋 TL;DR
This vulnerability allows an attacker on the local network to send a malformed RTSP Describe request to the Ningyuanda TC155 device, causing a denial of service. The exploit is publicly available and affects version 57.0.2.0 of the device's RTSP service. Only devices on the same local network are vulnerable.
💻 Affected Systems
- Ningyuanda TC155
📦 What is this software?
Tc155 Firmware by Shenzhenningyuandatechnology
⚠️ Risk & Real-World Impact
Worst Case
Complete device crash requiring physical restart, disrupting all RTSP streaming services and potentially affecting other device functions.
Likely Case
RTSP service becomes unresponsive, interrupting video streaming functionality until service restart.
If Mitigated
Minimal impact if network segmentation isolates the device from untrusted local networks.
🎯 Exploit Status
Public exploit code available on GitHub, requires only network access and basic scripting knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None - vendor did not respond to disclosure
Restart Required: No
Instructions:
No official patch available. Monitor vendor website for updates.
🔧 Temporary Workarounds
Network Segmentation
allIsolate TC155 devices on separate VLAN or network segment from untrusted devices.
RTSP Service Restriction
allConfigure firewall to restrict RTSP traffic to only trusted IP addresses.
🧯 If You Can't Patch
- Implement strict network access controls to limit which devices can communicate with TC155 RTSP service.
- Monitor network traffic for malformed RTSP requests and implement automated alerting.
🔍 How to Verify
Check if Vulnerable:
Check device version via web interface or serial console. If version is 57.0.2.0 and RTSP service is enabled, device is vulnerable.
Check Version:
Check device web interface at http://[device-ip]/ or use serial console connection.
Verify Fix Applied:
No fix available to verify. Workarounds can be tested by attempting exploitation from restricted networks.
📡 Detection & Monitoring
Log Indicators:
- RTSP service crash logs
- Malformed RTSP Describe request patterns in application logs
Network Indicators:
- Unusual RTSP traffic from local network devices
- RTSP Describe requests with malformed headers
SIEM Query:
source="network_traffic" protocol="RTSP" method="DESCRIBE" AND (header_length>normal OR malformed_packet=true)