CVE-2025-9382

6.4 MEDIUM

📋 TL;DR

This vulnerability in FNKvision Y215 CCTV cameras allows attackers to exploit a backdoor in the Telnet service via manipulation of the s1_rf_test_config file. Attackers could gain unauthorized access to the device, potentially compromising video feeds and device control. Only users of the specific FNKvision Y215 model with vulnerable configurations are affected.

💻 Affected Systems

Products:
  • FNKvision Y215 CCTV Camera
Versions: Unknown specific versions, but appears to affect devices with IP 10.194.120.40 configuration
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with Telnet service enabled and accessible are vulnerable. Physical access may also be a factor.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing unauthorized access to video feeds, device reconfiguration, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized access to the device leading to video feed interception and potential device manipulation.

🟢

If Mitigated

Limited impact if devices are properly segmented and access controls are implemented.

🌐 Internet-Facing: HIGH - Devices exposed to the internet are directly accessible to attackers.
🏢 Internal Only: MEDIUM - Requires internal network access but could be exploited by compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploit details are publicly available but require specific conditions and manipulation of the s1_rf_test_config file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider workarounds or device replacement.

🔧 Temporary Workarounds

Disable Telnet Service

all

Disable the Telnet service on affected cameras to prevent exploitation

telnet service disable (camera-specific command)
systemctl disable telnet (if applicable)

Network Segmentation

all

Isolate CCTV cameras on separate VLAN with strict access controls

🧯 If You Can't Patch

  • Physically disconnect cameras from networks when not needed
  • Implement strict firewall rules blocking all Telnet traffic to cameras

🔍 How to Verify

Check if Vulnerable:

Check if Telnet service is running on port 23 and if s1_rf_test_config file exists in vulnerable state

Check Version:

Unknown - vendor-specific firmware check required

Verify Fix Applied:

Verify Telnet service is disabled and cannot be accessed on port 23

📡 Detection & Monitoring

Log Indicators:

  • Telnet authentication attempts
  • Unauthorized access to s1_rf_test_config file
  • Unexpected configuration changes

Network Indicators:

  • Telnet traffic to camera IPs on port 23
  • Unusual outbound connections from cameras

SIEM Query:

source_ip="camera_ip" AND dest_port=23 AND protocol="TCP"

🔗 References

📤 Share & Export