CVE-2025-9380

CCTV · CCTV Multiple Products

A high-severity vulnerability has been discovered in multiple CCTV products, including the FNKvision Y215 camera.

Executive summary

A high-severity vulnerability has been discovered in multiple CCTV products, including the FNKvision Y215 camera. Successful exploitation could allow an unauthenticated attacker to remotely control the affected camera, potentially leading to unauthorized surveillance, data theft, or using the device to attack other systems on the network. Organizations are urged to apply vendor-provided security updates immediately to mitigate the significant risk to physical and network security.

Vulnerability

This vulnerability is an unauthenticated command injection flaw in the web management interface of the affected CCTV devices. An attacker with network access to the device can send a specially crafted HTTP request to a specific endpoint on the web server. The device fails to properly sanitize user-supplied input within this request, allowing the attacker to inject and execute arbitrary operating system commands with the privileges of the root user, leading to a full compromise of the device.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.8. Exploitation of this flaw poses a significant risk to the organization, with potential consequences including the breach of confidential information through unauthorized access to live and recorded video feeds. An attacker could tamper with or delete recordings, disable cameras to create physical security blind spots, or use the compromised camera as a pivot point to launch further attacks against the internal corporate network. This could lead to physical security breaches, corporate espionage, reputational damage, and regulatory non-compliance.

Remediation

Immediate Action: Apply vendor security updates immediately across all affected CCTV devices. Prioritize patching for cameras that are internet-facing or monitor sensitive areas. After patching, verify that the update was successful and the device is operating correctly.

Proactive Monitoring: Actively monitor for exploitation attempts by reviewing web server access logs on the CCTV devices for unusual or malformed HTTP requests. Network monitoring should be configured to detect anomalous outbound traffic from cameras to unknown external IP addresses, which could indicate a compromise. System logs should be reviewed for unexpected reboots or configuration changes.

Compensating Controls: If patching cannot be performed immediately, implement the following controls:

  • Isolate the CCTV camera network onto a dedicated, restricted VLAN.
  • Use a firewall to strictly limit network access to the camera's management interface, allowing connections only from trusted administrative workstations.
  • If the web management interface is not essential for daily operations, consider disabling it.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.8) and the potential for complete device compromise, it is strongly recommended that organizations prioritize the immediate application of vendor-supplied patches. This vulnerability presents a direct threat to both physical and cybersecurity. While this CVE is not currently listed on the CISA KEV catalog, the risk of unauthorized surveillance and network intrusion warrants urgent attention. If patching is delayed, compensating controls such as network segmentation and access restriction must be implemented without delay to reduce the attack surface.