CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-34043: Vacron NVR Remote Command Execution

10.0 CVSS

Description

A remote command injection vulnerability exists in Vacron Network Video Recorder (NVR) devices v1.4 due to improper input sanitization in the board.cgi script. The vulnerability allows unauthenticated attackers to pass arbitrary commands to the underlying operating system via crafted HTTP requests. These commands are executed with the privileges of the web server process, enabling remote code execution and potential full device compromise.

Classification

CVE ID: CVE-2025-34043

CVSS Base Severity: CRITICAL

CVSS Base Score: 10.0

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem Types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-20 Improper Input Validation

Affected Products

Vendor: Vacron

Product: Network Video Recorder (NVR)

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.41% (probability of being exploited)

EPSS Percentile: 60.23% (scored less or equal to compared to others)

EPSS Date: 2025-07-09 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-34043
https://www.tenable.com/plugins/nessus/104124
https://www.sonicwall.com/blog/vacron-network-video-recorder-remote-command-execution
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=30386
https://vulncheck.com/advisories/vacron-nvr-remote-command-execution
https://www.vacron.com/

Timeline