CVE-2026-0855

8.8 HIGH

📋 TL;DR

Merit LILIN IP cameras have an OS command injection vulnerability that allows authenticated remote attackers to execute arbitrary commands on the device. This affects organizations using these cameras for surveillance or monitoring. Attackers can gain full control of vulnerable cameras.

💻 Affected Systems

Products:
  • Merit LILIN IP Camera models
Versions: Specific versions not detailed in references; likely multiple firmware versions affected
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but default credentials may be used. Exact model list not fully specified in provided references.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to pivot to internal networks, install persistent malware, disable surveillance, or use cameras as botnet nodes.

🟠

Likely Case

Attackers gain shell access to cameras, modify configurations, steal video feeds, or use devices for DDoS attacks.

🟢

If Mitigated

Limited impact if cameras are isolated in separate VLANs with strict network segmentation and authentication controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once authenticated. No public exploit code found in provided references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10626-afbe2-2.html

Restart Required: Yes

Instructions:

1. Contact Merit LILIN for firmware updates. 2. Download latest firmware from vendor. 3. Upload firmware via camera web interface. 4. Reboot camera after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras in separate VLAN with restricted access

Authentication Hardening

all

Change default credentials and implement strong authentication

🧯 If You Can't Patch

  • Segment cameras in isolated network with no internet access
  • Implement strict firewall rules allowing only necessary traffic to cameras

🔍 How to Verify

Check if Vulnerable:

Check camera model and firmware version against vendor advisory. Test authenticated command injection via web interface.

Check Version:

Check via camera web interface: System > Information or similar menu

Verify Fix Applied:

Verify firmware version matches patched version from vendor. Test command injection attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from cameras
  • Suspicious payloads in HTTP requests to camera web interface

SIEM Query:

source="camera_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export