🔐 CVE Alert

CVE-2025-34036

UNKNOWN 0.0

Shenzhen TVT CCTV-DVR Command Injection

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An OS command injection vulnerability exists in white-labeled DVRs manufactured by TVT, affecting a custom HTTP service called "Cross Web Server" that listens on TCP ports 81 and 82. The web interface fails to sanitize input in the URI path passed to the language extraction functionality. When the server processes a request to /language/[lang]/index.html, it uses the [lang] input unsafely in a tar extraction command without proper escaping. This allows an unauthenticated remote attacker to inject shell commands and achieve arbitrary command execution as root. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.

CWE CWE-78
Vendor shenzhen tvt
Product cctv-dvr
Published Jun 24, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for shenzhen tvt cctv-dvr

Be the first to know when new unknown vulnerabilities affecting shenzhen tvt cctv-dvr are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Shenzhen TVT / CCTV-DVR
0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
web.archive.org: https://web.archive.org/web/20160322204109/http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html exploit-db.com: https://www.exploit-db.com/exploits/39596 vulncheck.com: https://vulncheck.com/advisories/shenzhen-tvt-cctv-dvr-command-injection

Credits

Ophir Harpaz (k1p0d)