CVE-2025-31702
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-16
Assigner: Dahua Technologies
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dahua | ipc-ecxx | * |
| dahua | sd2a | * |
| dahua | sd3a | * |
| dahua | ipc-2xxx | * |
| dahua | ipc-wx | * |
| dahua | sd2c | * |
| dahua | sd3d | * |
| dahua | tpc-ca | * |
| dahua | tpc-aebf5201 | * |
| dahua | ipc-1xxx | * |
| dahua | sdt2a | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves verifying if the Dahua product is running a vulnerable version built before July 1, 2025. This can be done by accessing the product's web interface and navigating to Settings β System Information β Version Information to check the build time. Additionally, monitoring for specific HTTP requests that attempt to access admin-restricted data using normal user credentials may indicate exploitation attempts. However, no specific detection commands are provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include verifying the product's build time and upgrading to fixed software versions provided by Dahua. If the product supports cloud upgrades, apply the patch via cloud upgrade. Otherwise, download the fixed version manually from Dahua's official website or contact local technical support. Additionally, consider limiting user accounts to avoid having only normal user credentials that could be exploited, and monitor for suspicious HTTP requests. [1]
Can you explain this vulnerability to me?
This vulnerability affects certain Dahua embedded products and allows a third-party attacker who has obtained normal user credentials to exploit a flaw via specific HTTP requests. This exploitation enables access to data normally restricted to admin privileges, such as system-sensitive files. It can also lead to tampering with the admin password, resulting in privilege escalation. Systems configured with only an admin account are not affected. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker with normal user credentials to access sensitive admin-level data and potentially change the admin password. This leads to privilege escalation, giving the attacker higher-level access and control over the system, which can compromise system integrity and security. [1]