CVE-2025-34042
BaseFortify
Publication date: 2025-06-26
Last updated on: 2025-11-20
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-34042 is an authenticated command injection vulnerability in the Beward N100 IP Camera firmware version M2.1.6.04C014. It occurs via the ServerName and TimeZone parameters on the camera's servetest CGI page. An attacker with access to the web interface can inject arbitrary system commands because these parameters are embedded into backend system calls without proper input sanitization. Successful exploitation allows remote code execution with root privileges, giving the attacker full control over the device. [1, 4]
How can this vulnerability impact me? :
This vulnerability can have severe impacts including allowing an attacker to execute arbitrary commands on the device with root privileges. This means the attacker can gain full system access, potentially leading to unauthorized control of the camera, denial of service, and compromise of the device's confidentiality, integrity, and availability. Since the camera is used for real-time video transmission and local recording, exploitation could disrupt surveillance operations and expose sensitive video data. [1, 2, 4]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the 'ServerName' and 'TimeZone' GET parameters on the 'servertest' CGI page of the Beward N100 IP Camera firmware version M2.1.6.04C014 for command injection. Example commands include injecting system commands such as 'id' via these parameters to confirm root-level access. Specifically, sending crafted HTTP requests to the camera's web interface targeting these parameters and observing if arbitrary commands execute can confirm the presence of the vulnerability. [4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the camera's web interface to trusted users only, disabling remote access if possible, and applying any available firmware updates or patches from the vendor. Since the vulnerability requires authenticated access, enforcing strong authentication and network segmentation can reduce risk. If no patch is available, consider removing the device from critical networks until a fix is applied. [1, 2, 4]