Vilar VS-IPC1002 IP cameras are vulnerable to Reflected XSS (Cross-site Scripting) attacks, because parameters in GET requests sent to /cgi-bin/action endpoint are not sanitized properly, making it possible to target logged in admin users.
The vendor did not respond in any way. Only version 1.1.0.18 was tested, other versions might be vulnerable as well.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2025/10/CVE-2025-53701 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
04 Nov 2025, 13:10
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:vimicro:vs-ipc1002_firmware:1.1.0.18:*:*:*:*:*:*:* cpe:2.3:h:vimicro:vs-ipc1002:-:*:*:*:*:*:*:* |
|
| First Time |
Vimicro vs-ipc1002 Firmware
Vimicro vs-ipc1002 Vimicro |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| References | () https://cert.pl/en/posts/2025/10/CVE-2025-53701 - Third Party Advisory |
23 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-23 14:15
Updated : 2025-11-04 13:10
NVD link : CVE-2025-53701
Mitre link : CVE-2025-53701
CVE.ORG link : CVE-2025-53701
JSON object : View
Products Affected
vimicro
- vs-ipc1002_firmware
- vs-ipc1002
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
