CVE-2025-7503

Description

An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation.

Category

10.0
CVSS
Severity: Critical
CVSS 4.0 •
Affected: Shenzhen Liandian Communication Technology LTD V380 IP Camera / AppFHE1_V1.0.6.0
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-7503?
CVE-2025-7503 has been scored as a critical severity vulnerability.
How to fix CVE-2025-7503?
To fix CVE-2025-7503, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-7503 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-7503 is being actively exploited.
What software or system is affected by CVE-2025-7503?
CVE-2025-7503 affects Shenzhen Liandian Communication Technology LTD V380 IP Camera / AppFHE1_V1.0.6.0.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.