Two major security flaws, CVE-2025-7723 and CVE-2025-7724, have been revealed by TP-Link and are present in its VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2 network video recorder devices. Through these vulnerabilities, attackers can potentially use the underlying operating system to send arbitrary commands on the whole device. While CVE-2025-7723 is an authentication-traversal vulnerability that asks for legitimate credentials, CVE-2025-7724 is more serious since it permits unauthenticated attackers to obtain OS-level access without logging in. The devices were exposed to network compromise and eavesdropping by the surveillance through the exploitation of old firmware. The attacks are made possible by the vulnerabilities, which are caused by insecure input validation in the compromised device firmware. Insecure or default passwords would leave CVE-2025-7723 vulnerable to exploitation, particularly in situations with weak access controls. This largely encompasses weak access control restrictions. Since it doesn't require authentication, CVE-2025-7724 is highly dangerous and extremely vulnerable to exploitation in the wild. These bugs highlight the dangers of using unpatched software on internet-confronting security devices, particularly critical surveillance infrastructure. The current firmware of version 1.1.5 Build 250518 for NVR1104H-4P V1 and version 1.3.1 Build 250407 for NVR2016H-16MP V2 should be upgraded on users' systems as soon as possible. Network access to the devices should also be limited, multi-factor authentication should be used whenever possible, and strong, one-time credentials should be verified. Endpoint hardening procedures, offline backups, and firmware verifications in regular intervals should be practiced to reduce resultant future threats.
A Chinese state-sponsored advanced persistent threat (APT) group has been linked to the compromise of a military organization based in the Philippines through the deployment of a n...
Cybersecurity experts have detected two new malware families: CHILLYHELL, a macOS backdoor with modularity, and ZynorRAT, a remote access trojan using Go for Windows and Linux syst...
Siemens has issued a critical security advisory regarding a newly discovered vulnerability in its SIMATIC Virtualization as a Service (SIVaaS) platform. Tracked as CVE-2025-40804, ...