CVE-2025-63408

7.8 HIGH

📋 TL;DR

Local Agent DVR versions through 6.6.1.0 contain a directory traversal vulnerability that allows unauthenticated local attackers to access sensitive files, perform SSRF attacks, or execute arbitrary OS commands. This affects all systems running vulnerable versions of Agent DVR software. Attackers can exploit this without authentication from the local network.

💻 Affected Systems

Products:
  • Local Agent DVR
Versions: All versions through 6.6.1.0
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the Agent DVR API/web interface component. All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution, allowing attackers to install malware, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Information disclosure of sensitive files and potential SSRF attacks against internal services.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent local network access to the Agent DVR service.

🌐 Internet-Facing: HIGH if the Agent DVR service is exposed to the internet, as unauthenticated attackers can exploit it remotely.
🏢 Internal Only: HIGH as the vulnerability can be exploited by any local network user without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed technical analysis and proof-of-concept code is publicly available. The vulnerability is straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.6.2.0 or later

Vendor Advisory: https://ispysoftware.github.io/Agent_API/

Restart Required: Yes

Instructions:

1. Download the latest version from the official Agent DVR website. 2. Stop the Agent DVR service. 3. Install the update. 4. Restart the service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Agent DVR service to trusted hosts only

# Linux firewall example: sudo iptables -A INPUT -p tcp --dport 8090 -s TRUSTED_IP -j ACCEPT
# Windows firewall: New-NetFirewallRule -DisplayName 'Agent DVR Access' -Direction Inbound -LocalPort 8090 -Protocol TCP -RemoteAddress TRUSTED_IP -Action Allow

Service Binding Restriction

all

Configure Agent DVR to bind only to localhost or specific interfaces

# Edit Agent DVR configuration to set bind address to 127.0.0.1 or specific interface IP

🧯 If You Can't Patch

  • Implement strict network access controls to prevent unauthorized access to the Agent DVR service port (default 8090)
  • Deploy the Agent DVR service in an isolated network segment with no access to sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check if Agent DVR version is 6.6.1.0 or earlier. Access the web interface and check version in settings or about page.

Check Version:

# Windows: Check AgentDVR.exe properties or service details
# Linux: Check installed package version or web interface about page

Verify Fix Applied:

Verify Agent DVR version is 6.6.2.0 or later. Test directory traversal attempts should fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Agent DVR logs
  • Multiple failed directory traversal attempts
  • Unexpected process execution from Agent DVR service

Network Indicators:

  • Unusual outbound connections from Agent DVR host
  • HTTP requests with directory traversal patterns (../, ..\) to Agent DVR port

SIEM Query:

source="agent_dvr.log" AND ("..\" OR "../" OR "%2e%2e" OR "%252e%252e")

🔗 References

📤 Share & Export