CVE-2025-53702

Vilar VS-IPC1002 IP cameras are vulnerable to DoS (Denial-of-Service) attacks. An unauthenticated attacker on the same local network might send a crafted request to /cgi-bin/action endpoint and render the device completely unresponsive. A manual restart of the device is required.  The vendor did not respond in any way. Only version 1.1.0.18 was tested, other versions might be vulnerable as well.
References
Link Resource
https://cert.pl/en/posts/2025/10/CVE-2025-53701 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:vimicro:vs-ipc1002_firmware:1.1.0.18:*:*:*:*:*:*:*
cpe:2.3:h:vimicro:vs-ipc1002:-:*:*:*:*:*:*:*

History

04 Nov 2025, 13:10

Type Values Removed Values Added
References () https://cert.pl/en/posts/2025/10/CVE-2025-53701 - () https://cert.pl/en/posts/2025/10/CVE-2025-53701 - Third Party Advisory
First Time Vimicro vs-ipc1002 Firmware
Vimicro vs-ipc1002
Vimicro
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:o:vimicro:vs-ipc1002_firmware:1.1.0.18:*:*:*:*:*:*:*
cpe:2.3:h:vimicro:vs-ipc1002:-:*:*:*:*:*:*:*

23 Oct 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-23 14:15

Updated : 2025-11-04 13:10


NVD link : CVE-2025-53702

Mitre link : CVE-2025-53702

CVE.ORG link : CVE-2025-53702


JSON object : View

Products Affected

vimicro

  • vs-ipc1002_firmware
  • vs-ipc1002
CWE
CWE-755

Improper Handling of Exceptional Conditions