CVE-2025-50777
📋 TL;DR
The AZIOT 2MP Smart Wi-Fi CCTV camera firmware contains an access control vulnerability that allows local attackers to gain root shell access. This exposes Wi-Fi and ONVIF credentials stored in plaintext, enabling network compromise. All users of version V1.00.02 are affected.
💻 Affected Systems
- AZIOT 2MP Full HD Smart Wi-Fi CCTV Home Security Camera
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete network takeover: attacker gains root access, steals all credentials, pivots to other systems, and deploys persistent malware across the network.
Likely Case
Local attacker gains root access, extracts Wi-Fi and ONVIF credentials, potentially compromising the camera feed and accessing other network resources.
If Mitigated
With proper network segmentation and access controls, impact limited to isolated camera system only.
🎯 Exploit Status
Exploit requires local network access. GitHub repository contains proof-of-concept details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: http://aziot.com
Restart Required: Yes
Instructions:
1. Check vendor website for firmware updates. 2. Download latest firmware. 3. Upload via camera web interface. 4. Reboot camera.
🔧 Temporary Workarounds
Network Segmentation
allIsolate camera on separate VLAN with strict firewall rules
Access Control Lists
allRestrict network access to camera management interface
🧯 If You Can't Patch
- Physically disconnect camera from network if not essential
- Place camera behind firewall with strict inbound/outbound rules
🔍 How to Verify
Check if Vulnerable:
Check firmware version in camera web interface. If version is V1.00.02, device is vulnerable.
Check Version:
Check via camera web interface at Settings > System > Firmware Version
Verify Fix Applied:
Verify firmware version has been updated beyond V1.00.02. Attempt to access root shell via known exploit methods to confirm fix.
📡 Detection & Monitoring
Log Indicators:
- Unexpected root login attempts
- Unauthorized shell access logs
- Configuration file access
Network Indicators:
- Unexpected SSH/Telnet connections to camera
- Unusual outbound traffic from camera
SIEM Query:
source="camera_logs" AND (event="root_login" OR event="shell_access")