CVE-2025-7503

CRITICAL

OEM IP Camera <AppFHE1_V1.0.6.0 - Command Injection

Title source: llm
STIX 2.1

Description

An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation.

Scores

CVSS v4 10.0
EPSS 0.0084
EPSS Percentile 74.7%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Red

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-798
Status published
Products (1)
Shenzhen Liandian Communication Technology LTD/V380 IP Camera / AppFHE1_V1.0.6.0 1.0.6.0
Published Jul 11, 2025
Tracked Since Feb 18, 2026