Wednesday , July 16 2025
root access

CVE-2025-7503 (CVSS 10)
Backdoor in popular IP Camera Allows Hackers Root Access

A severe vulnerability (CVE-2025-7503) has been found in an IP camera from Shenzhen Liandian Communication Technology LTD. With a CVSSv4 score of 10, this issue allows attackers root access via an undocumented Telnet service, threatening privacy and security.

The vulnerability lies in the camera’s firmware (AppFHE1_V1.0.6.0) and its associated kernel (KerFHE1_PTZ_WIFI_V3.1.1) and hardware (HwFHE1_WF6_PTZ_WIFI_20201218). The device exposes a Telnet service on port 23, which is:
Enabled by default
Not mentioned in the user manual
Inaccessible via the web interface or mobile app

Node.js Flaws Expose Windows Apps to Path Traversal & HashDoS Attacks

The OpenJS Foundation has updated Node.js 24.x, 22.x, and 20.x to fix two serious vulnerabilities—CVE-2025-27210 and CVE-2025-27209—that could endanger Windows...
Read More
Node.js Flaws Expose Windows Apps to Path Traversal & HashDoS Attacks

Broadcom fixes multiple vulnerabilities in VMware ESXi, Workstation, and Fusion

Broadcom has urgently alerted about four serious vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools, with CVSS scores up to...
Read More
Broadcom  fixes multiple vulnerabilities in VMware ESXi, Workstation, and Fusion

Oracle Patched 309 Vulnerabilities with 145 Remotely Exploitable Flaw

Oracle's July 2025 Critical Patch Update was released fixing 309 security vulnerabilities across its products. The update impacts 34 key...
Read More
Oracle Patched 309 Vulnerabilities with 145 Remotely Exploitable Flaw

Microsoft Extends 365 Support Until 2028 with ESU Program

Microsoft has quietly revealed that it will stop adding new features to Office apps (Microsoft 365) for Windows 10 users...
Read More
Microsoft Extends 365 Support Until 2028 with ESU Program

Meta’s $100B AI Push: Gigawatt-Size Data Centers Spark Water Crisis

Zuckerberg announced that the company is constructing Gigawatt-Size Data Centers for its AI projects, with the first one launching next...
Read More
Meta’s $100B AI Push: Gigawatt-Size Data Centers Spark Water Crisis

4 vulns impact Gigabyte motherboards to UEFI malware bypassing Secure Boot

Four vulnerabilities in Gigabyte firmware were found by Binarly researchers and reported to Carnegie Mellon University's CERT Coordination Center. The...
Read More
4 vulns impact Gigabyte motherboards to UEFI malware bypassing Secure Boot

Wing FTP 2000+ Servers Exposed Online: Actively Exploiting

Security researchers warn that hackers are exploiting a critical vulnerability in Wing FTP Server to gain control of affected systems....
Read More
Wing FTP 2000+ Servers Exposed Online: Actively Exploiting

CVE-2025-7503 (CVSS 10)
Backdoor in popular IP Camera Allows Hackers Root Access

A severe vulnerability (CVE-2025-7503) has been found in an IP camera from Shenzhen Liandian Communication Technology LTD. With a CVSSv4...
Read More
CVE-2025-7503 (CVSS 10)  Backdoor in popular IP Camera Allows Hackers Root Access

(CVE-2025-25257)
Patch Urgently! Exploits for pre-auth Fortinet FortiWeb RCE flaw released

Proof of concept exploits for a serious SQLi vulnerability in Fortinet FortiWeb have been released, allowing pre-authenticated remote code execution...
Read More
(CVE-2025-25257)  Patch Urgently! Exploits for pre-auth Fortinet FortiWeb RCE flaw released

GP launched appless ‘GP Shield’ to protect mobile for only 50 TK

Kaspersky's research says that in 2024, 33.3 million cyber attacks were launched worldwide against mobile devices. The aim of these...
Read More
GP launched appless ‘GP Shield’ to protect mobile for only 50 TK

Even more disturbing, attackers can connect to this service using hard-coded credentials, granting immediate root shell access. As the CVE description notes, “an attacker with network access can authenticate using default credentials and gain root-level shell access to the device.”

Security researchers couldn’t reach the vendor, so no firmware update or official statement has been released. The report highlights that the vendor does not allow disabling Telnet. Users cannot change or remove credentials, and there’s no option to turn off the Telnet service.

This level of access allows an attacker to:

View or redirect live camera feeds
Modify the filesystem
Launch network-based attacks from the device
Implant persistent malware or backdoors

CVE-2025-7503 affects more than just one camera model; it highlights issues with low-cost OEM IoT devices that often have insecure defaults and undocumented features.

Attackers with root shell access can fully control the device. The advisory states: “Root shell access provides total control over the device, including its filesystem, networking, and camera feeds.”

In large places like offices, schools, and public areas, such access can enable surveillance, manipulation, or use of cameras for internal attacks.

While there’s no vendor fix, affected users can take defensive steps:

Isolate IP cameras from main networks using VLANs
Block Telnet (port 23) at the network level via firewall rules
Monitor outbound traffic for unusual behavior
Replace the device if you require hardened security and vendor support

Check Also

4 vulns impact Gigabyte motherboards to UEFI malware bypassing Secure Boot

Four vulnerabilities in Gigabyte firmware were found by Binarly researchers and reported to Carnegie Mellon …

Leave a Reply

Your email address will not be published. Required fields are marked *