CVE-2025-9382
BaseFortify
Publication date: 2025-08-24
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fnkvision | y215 | 10.194.120.40 |
| fnkvision | y215 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-912 | The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the FNKvision Y215 CCTV Camera is caused by an undocumented backdoor triggered when a file named "s1_rf_test_config" is placed on an inserted SD card. This causes the device to automatically start the Telnet service, which uses hardcoded and publicly known credentials. Attackers with brief physical access to the device can enable remote administrative access without proper authentication, significantly increasing the attack surface and allowing unauthorized access. [1, 2]
How can this vulnerability impact me? :
The vulnerability allows attackers with physical access to the device to enable a backdoor that provides remote administrative access without authentication. This compromises the confidentiality, integrity, and availability of the device, potentially allowing unauthorized control, data exposure, or disruption of the CCTV camera's operation. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the device has the file named "s1_rf_test_config" on an inserted SD card, which triggers the Telnet service. Additionally, you can scan the device for an active Telnet service on the IP 10.194.120.40. Since the Telnet service uses hardcoded credentials, attempting to connect via Telnet to the device and verifying access may indicate the presence of the backdoor. Network scanning tools like nmap can be used to detect open Telnet ports (usually port 23). Example command: `nmap -p 23 10.194.120.40` to check if Telnet is open. If Telnet is open, attempting to login with known default credentials can confirm the vulnerability. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include physically removing or preventing insertion of SD cards containing the file "s1_rf_test_config" to avoid triggering the backdoor. Since no patches or vendor mitigations are available, it is recommended to replace the affected FNKvision Y215 CCTV Camera device. Additionally, restricting physical access to the device to prevent attackers from inserting the malicious file is critical. Network-level controls such as blocking Telnet access to the device can reduce exposure. [2, 1]