CVE-2025-66049

7.5 HIGH

📋 TL;DR

Vivotek IP7137 cameras with firmware version 0200a allow unauthenticated access to live RTSP video feeds on port 8554. This affects all users of these cameras, particularly those with network-accessible devices, as the vendor has declared End-Of-Life and won't release patches.

💻 Affected Systems

Products:
  • Vivotek IP7137 camera
Versions: Firmware version 0200a (possibly all versions)
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Product is End-Of-Life, so no firmware updates will be released. All configurations with RTSP enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete privacy breach with continuous surveillance of private spaces, potential blackmail material collection, and integration into botnets for malicious streaming.

🟠

Likely Case

Unauthorized viewing of camera feeds in homes, businesses, or sensitive areas, leading to privacy violations and potential reconnaissance for physical security breaches.

🟢

If Mitigated

Limited exposure if cameras are isolated on internal networks with strict firewall rules, though insider threats remain possible.

🌐 Internet-Facing: HIGH - Any camera exposed to the internet can be accessed by anyone without authentication, making it trivial to exploit.
🏢 Internal Only: MEDIUM - Internal network access still allows unauthorized viewing by employees, guests, or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to port 8554 and knowledge of the RTSP stream URL pattern. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: None

Restart Required: No

Instructions:

No official patch available due to End-Of-Life status. Replace with supported hardware or implement workarounds.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on a separate VLAN with strict firewall rules blocking all external access to port 8554.

Disable RTSP Protocol

all

Turn off RTSP streaming in camera settings if not required for functionality.

Access Control Lists

linux

Implement IP-based restrictions to only allow trusted systems to connect to port 8554.

iptables -A INPUT -p tcp --dport 8554 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 8554 -j DROP

🧯 If You Can't Patch

  • Physically disconnect cameras from networks when not in use or replace with supported models.
  • Deploy network monitoring to detect unauthorized access attempts to port 8554.

🔍 How to Verify

Check if Vulnerable:

Attempt to access the RTSP stream without credentials: use a tool like VLC or ffmpeg to connect to rtsp://CAMERA_IP:8554/live.sdp

Check Version:

Check camera web interface or use manufacturer-specific CLI commands (varies by model).

Verify Fix Applied:

After implementing workarounds, verify that unauthenticated RTSP connections fail or are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts on RTSP port
  • Unexpected connections to port 8554 from unauthorized IPs

Network Indicators:

  • Unencrypted RTSP traffic to port 8554 from unexpected sources
  • High volume of connections to camera RTSP port

SIEM Query:

source_port=8554 AND (NOT src_ip IN [trusted_ips])

🔗 References

📤 Share & Export