CVE-2025-39240
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-13

Last updated on: 2025-06-17

Assigner: Hangzhou Hikvision Digital Technology Co., Ltd.

Description
Some Hikvision Wireless Access Point are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-13
Last Modified
2025-06-17
Generated
2026-05-07
AI Q&A
2025-06-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects certain Hikvision Wireless Access Point models and allows attackers with valid credentials to execute arbitrary commands remotely. It occurs due to insufficient input validation, enabling an attacker to send specially crafted packets containing malicious commands to the device, leading to remote command execution. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to a complete compromise of the affected device, impacting confidentiality, integrity, and availability. An attacker with valid credentials can execute arbitrary commands remotely, potentially disrupting network operations, stealing sensitive information, or damaging device functionality. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves verifying if your Hikvision Wireless Access Point is running an affected firmware version (up to V1.1.5402 build241014 or V1.1.5400 build240814 depending on model). Since the vulnerability requires authenticated access and involves crafted packets, you can check device firmware versions via the device management interface or command line. Specific commands are not provided in the available resources. It is recommended to review device firmware version and monitor for unusual command execution or network traffic from authenticated users. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the affected Hikvision Wireless Access Point devices to the fixed firmware version V1.1.6300 build250331 (R2263) or later, which resolves the vulnerability. Additionally, restrict access to the management interface to trusted users only, enforce strong authentication, and monitor for suspicious activity involving command execution. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart