Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vivotek Vulnerability Allows Remote Users to Inject Arbitrary Code

Critical Vivotek Vulnerability Allows Remote Users to Inject Arbitrary Code

Posted on January 22, 2026January 22, 2026 By CWS

A important distant code injection vulnerability in Vivotek legacy firmware that permits unauthenticated attackers to execute arbitrary instructions with root privileges.

The vulnerability, tracked as CVE-2026-22755, impacts dozens of digital camera fashions and poses important dangers to organizations counting on legacy surveillance infrastructure.

The vulnerability exists within the upload_map.cgi script, the place user-supplied filenames are processed by way of an unsanitized snprintf() operate earlier than being handed to the system() name.

This permits attackers to inject shell instructions through specifically crafted filenames that include metacharacters, resembling semicolons.

Vivotek Vulnerability

Akamai researchers found that Vivotek legacy cameras lack password safety by default, eliminating authentication limitations.

The exploit requires 5 particular situations: file measurement below 5MB, firmware verification bypass, and an intact /usr/sbin/confclient binary.

Disassembled code exhibiting consumer enter handed to system() (supply : Akamai)

Non-standard internet server atmosphere variables, and entry by way of upload_map.cgi slightly than file_manager.cgi.

Researchers created a bash script that generates legitimate firmware photographs with correct magic bytes (FF V FF FF header and FF Ok FF FF footer) to bypass validation checks.

By setting atmosphere variables, together with POST_FILE_NAME=”test_firmware.bin; id;”, attackers set off command execution as the basis consumer, as evidenced by proof-of-concept demonstrations wherein the id command confirmed a uid of 0 (root).

Decompiled code exhibiting how cgi-bin script should be known as( supply: Akamai)

The vulnerability impacts 36 digital camera fashions throughout a number of product strains.

Mannequin SeriesAffected FirmwareFD8365, FD9165, FD93710100a–0125cFE9180, FE91910100a–0125cIB9365, IP9165, IP91710100a–0125cMA9321, MS9390, TB93300100a–0125c

Assault State of affairs

An attacker can remotely add a malicious firmware file with an embedded command within the filename.

When processed by the susceptible upload_map.In a CGI script, the shell metacharacter triggers command execution.

The ensuing payload executes with root privileges, enabling full system compromise, lateral community motion, botnet set up, or knowledge exfiltration.

In accordance with Akamai, organizations ought to implement network-level detection utilizing the next YARA rule to establish exploitation makes an attempt:

rule CVE_2026_22755_Vivotek_upload
{
meta:
description = “Detects upload_map.cgi requests with camid parameter”

strings:
$path = “/cgi-bin/admin/upload_map.cgi”
$param = “camid=”

situation:
all of them
}

Prioritize firmware updates for affected digital camera fashions instantly. Implement community segmentation to isolate legacy digital camera infrastructure.

Deploy intrusion detection signatures for malicious upload_map.cgi requests. Conduct stock audits to establish deployed susceptible gadgets.

Monitor for suspicious file uploads and POST requests to digital camera administration interfaces.

This vulnerability represents a important IoT safety threat, notably for organizations working legacy surveillance programs in important infrastructure, healthcare, and enterprise environments.

Unauthenticated distant code execution with root privileges allows full machine compromise and potential community propagation by way of botnet-based distributed denial-of-service assaults.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Arbitrary, Code, Critical, Inject, Remote, Users, Vivotek, Vulnerability

Post navigation

Previous Post: AiStrike Raises $7 Million in Seed Funding
Next Post: New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages

Related Posts

OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data Cyber Security News
New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules Cyber Security News
Top 10 Best Model Context Protocol (MCP) Servers in 2025 Top 10 Best Model Context Protocol (MCP) Servers in 2025 Cyber Security News
Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data Cyber Security News
New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals Cyber Security News
Beware of the New ‘Executive Award’ Campaign That Uses ClickFix to Deliver Stealerium Malware Beware of the New ‘Executive Award’ Campaign That Uses ClickFix to Deliver Stealerium Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark