CVE-2025-31702
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-15

Last updated on: 2025-10-16

Assigner: Dahua Technologies

Description
A vulnerability exists in certain Dahua embedded products. Third-party malicious attacker with obtained normal user credentials could exploit the vulnerability to access certain data which are restricted to admin privileges, such as system-sensitive files through specific HTTP request. This may cause tampering with admin password, leading to privilege escalation. Systems with only admin account are not affected.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-15
Last Modified
2025-10-16
Generated
2026-05-07
AI Q&A
2025-10-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 11 associated CPEs
Vendor Product Version / Range
dahua ipc-ecxx *
dahua sd2a *
dahua sd3a *
dahua ipc-2xxx *
dahua ipc-wx *
dahua sd2c *
dahua sd3d *
dahua tpc-ca *
dahua tpc-aebf5201 *
dahua ipc-1xxx *
dahua sdt2a *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves verifying if the Dahua product is running a vulnerable version built before July 1, 2025. This can be done by accessing the product's web interface and navigating to Settings β†’ System Information β†’ Version Information to check the build time. Additionally, monitoring for specific HTTP requests that attempt to access admin-restricted data using normal user credentials may indicate exploitation attempts. However, no specific detection commands are provided in the available resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include verifying the product's build time and upgrading to fixed software versions provided by Dahua. If the product supports cloud upgrades, apply the patch via cloud upgrade. Otherwise, download the fixed version manually from Dahua's official website or contact local technical support. Additionally, consider limiting user accounts to avoid having only normal user credentials that could be exploited, and monitor for suspicious HTTP requests. [1]


Can you explain this vulnerability to me?

This vulnerability affects certain Dahua embedded products and allows a third-party attacker who has obtained normal user credentials to exploit a flaw via specific HTTP requests. This exploitation enables access to data normally restricted to admin privileges, such as system-sensitive files. It can also lead to tampering with the admin password, resulting in privilege escalation. Systems configured with only an admin account are not affected. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker with normal user credentials to access sensitive admin-level data and potentially change the admin password. This leads to privilege escalation, giving the attacker higher-level access and control over the system, which can compromise system integrity and security. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart