CVE-2025-25680
📋 TL;DR
This vulnerability allows remote code execution on LSC Smart Connect Indoor PTZ Cameras when a specially crafted QR code is presented during Wi-Fi configuration. Attackers can gain full control of affected cameras by exploiting the tuya_ipc_direct_connect function. This affects users of LSC Indoor PTZ Camera version 7.6.32.
💻 Affected Systems
- LSC Smart Connect LSC Indoor PTZ Camera
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of camera system allowing persistent access, video stream interception, lateral movement to other network devices, and potential use as botnet nodes.
Likely Case
Camera takeover enabling unauthorized video surveillance, credential harvesting, and use as foothold for further network attacks.
If Mitigated
Limited impact with network segmentation and QR code scanning restrictions, though camera functionality may still be compromised.
🎯 Exploit Status
Exploitation requires physical or network proximity to present malicious QR code during Wi-Fi setup process.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: >7.6.32
Vendor Advisory: Not provided in references
Restart Required: Yes
Instructions:
1. Contact LSC Smart Connect for firmware update 2. Download latest firmware from vendor portal 3. Upload firmware via camera web interface 4. Reboot camera after update completes
🔧 Temporary Workarounds
Disable QR Code Wi-Fi Setup
allPrevent camera from using QR code scanning for network configuration
Use manual Wi-Fi configuration instead of QR code method
Network Segmentation
network-switchIsolate cameras on separate VLAN with restricted access
vlan 100
name CAMERA-NETWORK
interface vlan 100
ip access-group CAMERA-ACL in
🧯 If You Can't Patch
- Physically secure cameras to prevent unauthorized QR code presentation
- Disable camera Wi-Fi and use wired Ethernet only with strict network controls
🔍 How to Verify
Check if Vulnerable:
Check camera firmware version via web interface at http://[camera-ip]/system.html
Check Version:
curl -s http://[camera-ip]/system.html | grep 'Firmware Version'
Verify Fix Applied:
Confirm firmware version is greater than 7.6.32 and test QR code Wi-Fi setup functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation in anyka_ipc
- Multiple failed QR code scan attempts
- Unexpected network connections from camera
Network Indicators:
- Camera initiating connections to unknown external IPs
- Unusual outbound traffic patterns from camera
SIEM Query:
source="camera-logs" AND (process="anyka_ipc" AND event="exec") OR (event="qr_scan" AND result="success")