CVE-2025-65817
LSC · LSC Multiple Products
A high-severity vulnerability has been identified in LSC Smart Connect Indoor IP Cameras, allowing an unauthenticated remote attacker to potentially take full control of the device.
Executive summary
A high-severity vulnerability has been identified in LSC Smart Connect Indoor IP Cameras, allowing an unauthenticated remote attacker to potentially take full control of the device. Successful exploitation could lead to unauthorized access to live video feeds, network intrusion, and the compromise of sensitive data. Organizations are urged to apply the vendor-provided security updates immediately to mitigate the significant risk of privacy breaches and further network attacks.
Vulnerability
This vulnerability is an unauthenticated command injection flaw within the web management interface of the LSC Smart Connect Indoor IP Camera. An unauthenticated attacker on the same network can send a specially crafted HTTP request to the device, injecting and executing arbitrary operating system commands with root-level privileges. Exploitation does not require any prior authentication or user interaction, making it a critical risk for any exposed device.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit poses a direct and severe threat to business operations and security. The primary impacts include a complete loss of confidentiality, integrity, and availability of the affected camera systems. Specific risks include unauthorized surveillance of sensitive areas, violation of privacy regulations, and the ability for an attacker to use the compromised camera as a pivot point to launch further attacks against the internal corporate network.
Remediation
Immediate Action: Organizations must prioritize the deployment of security patches provided by LSC to all affected devices immediately. After patching, system administrators should review device access logs and network logs for any signs of compromise or unusual activity preceding the update.
Proactive Monitoring: Implement enhanced monitoring for affected devices. Security teams should look for unusual outbound network traffic from cameras to unknown external IP addresses, unexpected system reboots, or anomalous API calls to the device's management interface. Intrusion Detection Systems (IDS) should be configured with rules to detect and alert on common command injection payloads.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the attack surface:
- Isolate the IP cameras on a segregated network VLAN with strict firewall rules, allowing only necessary traffic to and from the devices.
- Block all access to the camera's management interface from external networks and untrusted internal network segments.
- Ensure the device is not exposed directly to the internet.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.8, this vulnerability presents a critical risk that requires immediate attention. The recommended course of action is to apply the vendor-supplied security updates across all affected LSC camera systems without delay. While this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity warrants treating it with the highest priority. If patching cannot be performed immediately, the implementation of compensating controls, particularly network segmentation, is essential to mitigate the risk of compromise.