CVE-2025-53701
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-23

Last updated on: 2025-11-04

Assigner: CERT.PL

Description
Vilar VS-IPC1002 IP cameras are vulnerable to Reflected XSS (Cross-site Scripting) attacks, because parameters in GET requests sent to /cgi-bin/action endpoint are not sanitized properly, making it possible to target logged in admin users. The vendor did not respond in any way. Only version 1.1.0.18 was tested, other versions might be vulnerable as well.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-23
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-10-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
vimicro vs-ipc1002_firmware 1.1.0.18
vimicro vs-ipc1002 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in Vilar VS-IPC1002 IP cameras is a Reflected Cross-site Scripting (XSS) attack. It occurs because parameters in GET requests sent to the /cgi-bin/action endpoint are not properly sanitized. This allows an attacker to craft malicious requests that can execute scripts in the context of logged-in admin users, potentially compromising their session or data.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute malicious scripts in the browser of logged-in admin users. This can lead to session hijacking, unauthorized actions performed with admin privileges, or theft of sensitive information accessible to the admin user.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart