An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://github.com/AounShAh/Research-on-v380-cctv-ip-camera |     | 
History
                    Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | 
Fri, 11 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 11 Jul 2025 19:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation. | |
| Weaknesses | CWE-798 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Toreon
Published: 2025-07-11T18:53:24.618Z
Updated: 2025-07-11T19:17:15.281Z
Reserved: 2025-07-11T18:53:07.764Z
Link: CVE-2025-7503
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-11T19:17:06.232Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-07-11T19:15:24.217
Modified: 2025-07-15T13:14:49.980
Link: CVE-2025-7503
 Redhat
                        Redhat
                    No data.