CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-34042: Beward N100 IP Camera Remote Command Execution

9.4 CVSS

Description

An authenticated command injection vulnerability exists in the Beward N100 IP Camera firmware version M2.1.6.04C014 via the ServerName and TimeZone parameters in the servetest CGI page. An attacker with access to the web interface can inject arbitrary system commands into these parameters, which are unsafely embedded into backend system calls without proper input sanitization. Successful exploitation results in remote code execution with root privileges.

Classification

CVE ID: CVE-2025-34042

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.4

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem Types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-20 Improper Input Validation

Affected Products

Vendor: Beward

Product: N100 IP Camera

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.66% (probability of being exploited)

EPSS Percentile: 70.17% (scored less or equal to compared to others)

EPSS Date: 2025-07-09 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-34042
https://www.beward.net
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5512.php
https://www.fortiguard.com/encyclopedia/ips/48618
https://s4e.io/tools/beward-n100-h264-vga-ip-camera-arbitrary-file-disclosure
https://packetstorm.news/files/id/151531
https://cxsecurity.com/issue/WLB-2019020042
https://vulncheck.com/advisories/beward-n100-remote-command-execution

Timeline