CVE-2025-66051

6.5 MEDIUM

📋 TL;DR

Vivotek IP7137 cameras with firmware version 0200a are vulnerable to path traversal attacks, allowing authenticated attackers to access files outside the webroot directory. Combined with CVE-2025-66050 (default empty admin password), this creates a significant security risk. All firmware versions may be affected, and no fix is expected since the product has reached end-of-life.

💻 Affected Systems

Products:
  • Vivotek IP7137 camera
Versions: Firmware version 0200a (possibly all versions)
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Default empty admin password (CVE-2025-66050) makes exploitation trivial. Product is end-of-life with no vendor support.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive system files, configuration data, or credentials, potentially leading to complete device compromise and lateral movement into connected networks.

🟠

Likely Case

Unauthorized access to camera configuration files, logs, or other web-accessible resources, potentially enabling further attacks or data exfiltration.

🟢

If Mitigated

Limited impact if strong authentication is enforced and network access is restricted, though the vulnerability remains present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication, but default empty password makes this trivial. Simple HTTP requests with path traversal sequences are sufficient.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: None

Restart Required: No

Instructions:

No official patch available. Vendor has not responded and product is end-of-life.

🔧 Temporary Workarounds

Set Strong Admin Password

all

Immediately set a strong, unique password for the administration panel to prevent unauthorized authentication.

Network Segmentation

all

Isolate cameras on separate VLANs with strict firewall rules limiting access to management interfaces.

🧯 If You Can't Patch

  • Immediately remove cameras from internet-facing networks and place behind firewalls with strict access controls.
  • Consider replacing end-of-life cameras with supported models that receive security updates.

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (typically under System > Information). Attempt authenticated HTTP requests with path traversal sequences (e.g., /../../etc/passwd).

Check Version:

Check via web interface or use nmap script: nmap -sV --script http-vuln-cve2025-66051 <target>

Verify Fix Applied:

No fix available to verify. Verify workarounds by testing that strong authentication is required and path traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences
  • Failed authentication attempts followed by successful login with default credentials
  • Access to unusual file paths in web logs

Network Indicators:

  • HTTP requests with path traversal patterns to camera management interface
  • Traffic from unexpected sources to camera admin ports

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR status=200 AND uri MATCHES "*../../*") AND dest_ip IN [camera_ips]

🔗 References

📤 Share & Export