CVE-2025-64983
prior · prior Multiple Products
A high-severity vulnerability has been identified in the firmware of 'prior' Smart Video Doorbells.
Executive summary
A high-severity vulnerability has been identified in the firmware of 'prior' Smart Video Doorbells. This flaw could allow an unauthenticated remote attacker to gain control of affected devices, potentially leading to a breach of privacy through access to video and audio feeds, or allowing the device to be used as an entry point into the local network.
Vulnerability
The vulnerability exists within the network service responsible for handling video stream requests on the Smart Video Doorbell. A lack of proper input validation allows a remote, unauthenticated attacker to send a specially crafted network packet to the device. This packet can trigger a buffer overflow, enabling the attacker to execute arbitrary code with root privileges on the device, effectively granting them complete control.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8. Exploitation could have significant business impacts, including a severe breach of physical security and privacy if an attacker gains access to live video and audio feeds. The compromised device could also be used as a pivot point to launch further attacks against other devices on the internal network. A successful attack could lead to reputational damage, data breaches, and a loss of customer trust.
Remediation
Immediate Action: The primary remediation is to apply vendor-supplied security updates immediately. All affected 'prior' Smart Video Doorbell devices must be updated to firmware version 2 or newer. Following the update, administrators should monitor for any signs of exploitation attempts by reviewing network and device access logs for anomalous activity.
Proactive Monitoring: Implement enhanced monitoring for network traffic to and from affected doorbell devices. Look for unusual outbound connections, unexpected port scanning originating from the device's IP address, or repeated service crashes indicated in device logs. An Intrusion Detection System (IDS) can be configured with rules to detect potential exploit traffic targeting the vulnerable service.
Compensating Controls: If immediate patching is not feasible, implement network segmentation by placing all Smart Video Doorbells on an isolated VLAN with strict firewall rules. Restrict the device's internet access to only essential vendor-related endpoints required for normal operation. This will limit an attacker's ability to communicate with the device from the internet and prevent a compromised device from accessing sensitive internal network resources.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 8) of this vulnerability, immediate action is required. All organizations using the affected 'prior' Smart Video Doorbells must prioritize the deployment of the vendor-provided firmware update. Although this CVE is not currently on the CISA KEV list, its characteristics make it a prime target for future exploitation. If patching cannot be performed immediately, implement the recommended compensating controls, such as network segmentation, to reduce the risk of compromise.