CVE-2026-0709
Unknown Unknown - Not Provided
Authenticated Command Injection in Hikvision Wireless Access Points

Publication date: 2026-01-30

Last updated on: 2026-02-27

Assigner: Hangzhou Hikvision Digital Technology Co., Ltd.

Description
Some Hikvision Wireless Access Points are vulnerable to authenticated command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-30
Last Modified
2026-02-27
Generated
2026-05-06
AI Q&A
2026-01-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
hikvision ds-3wap521-si to 1.1.6303 (exc)
hikvision ds-3wap522-si to 1.1.6303 (exc)
hikvision ds-3wap621e-si to 1.1.6303 (exc)
hikvision ds-3wap622e-si to 1.1.6303 (exc)
hikvision ds-3wap623e-si to 1.1.6303 (exc)
hikvision ds-3wap622g-si to 1.1.6303 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-0709 is an authenticated command execution vulnerability in certain Hikvision Wireless Access Points. Attackers who have valid credentials can exploit insufficient input validation by sending specially crafted packets containing malicious commands to the affected devices. This allows them to execute arbitrary commands on the device. [1]


How can this vulnerability impact me? :

This vulnerability can lead to a high impact on confidentiality, integrity, and availability of the affected devices. An attacker with valid credentials can execute arbitrary commands remotely, potentially compromising device functionality, accessing sensitive information, or disrupting network operations. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, users should download and apply the fixed firmware version V1.1.6601 build251223 or later for the affected Hikvision Wireless Access Point models from the official Hikvision website. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart