CVE-2025-66051
📋 TL;DR
Vivotek IP7137 cameras with firmware version 0200a are vulnerable to path traversal attacks, allowing authenticated attackers to access files outside the webroot directory. Combined with CVE-2025-66050 (default empty admin password), this creates a significant security risk. All firmware versions may be affected, and no fix is expected since the product has reached end-of-life.
💻 Affected Systems
- Vivotek IP7137 camera
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive system files, configuration data, or credentials, potentially leading to complete device compromise and lateral movement into connected networks.
Likely Case
Unauthorized access to camera configuration files, logs, or other web-accessible resources, potentially enabling further attacks or data exfiltration.
If Mitigated
Limited impact if strong authentication is enforced and network access is restricted, though the vulnerability remains present.
🎯 Exploit Status
Exploitation requires authentication, but default empty password makes this trivial. Simple HTTP requests with path traversal sequences are sufficient.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: None
Vendor Advisory: None
Restart Required: No
Instructions:
No official patch available. Vendor has not responded and product is end-of-life.
🔧 Temporary Workarounds
Set Strong Admin Password
allImmediately set a strong, unique password for the administration panel to prevent unauthorized authentication.
Network Segmentation
allIsolate cameras on separate VLANs with strict firewall rules limiting access to management interfaces.
🧯 If You Can't Patch
- Immediately remove cameras from internet-facing networks and place behind firewalls with strict access controls.
- Consider replacing end-of-life cameras with supported models that receive security updates.
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface (typically under System > Information). Attempt authenticated HTTP requests with path traversal sequences (e.g., /../../etc/passwd).
Check Version:
Check via web interface or use nmap script: nmap -sV --script http-vuln-cve2025-66051 <target>
Verify Fix Applied:
No fix available to verify. Verify workarounds by testing that strong authentication is required and path traversal attempts are blocked.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' sequences
- Failed authentication attempts followed by successful login with default credentials
- Access to unusual file paths in web logs
Network Indicators:
- HTTP requests with path traversal patterns to camera management interface
- Traffic from unexpected sources to camera admin ports
SIEM Query:
source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR status=200 AND uri MATCHES "*../../*") AND dest_ip IN [camera_ips]