Api injection causes device reboot
Warning number: GL-2025-0003
Initial release time: 2025-7-10
Update release time: Released with version plan
Summary:
An API of the device did not perform validity verification on the input parameters during playback. As a result, it did not throw an error when receiving abnormal data. Instead, it continued to perform illegal operations, eventually causing the system to crash.
This vulnerability has been assigned a CVE ID of: None.
The vulnerability information was discovered by internal testers when scanning using the ZAP vulnerability scanning tool.
Sphere of impact:
Affected versions and models:
NVR 8.2.3
NVR 8.2.4
NVR C1.2
IPC 8.2.3
IPC 8.2.4
IPC C1.2
| Name | Version | Model |
|---|---|---|
|
NVR
|
8.2.3 |
N7XXX N8XXX N63XX N6312X N88X N88SX D32XX D33XX2C D33XX D315X D3312X H7004 H32tXX |
|
NVR |
8.2.4 /C1.2 |
Same as above D75XX D75XX2C NA1XX |
|
IPC |
8.2.3 |
NT98528 SSC369G |
|
IPC |
8.2.4 |
SC335X SC327DE 339G 338G 30KQ 338Q NT98525 NT98528 NT98529 AX620A SC379G NT98566 SSC369G |
|
IPC |
C1.2 |
Same as above SSC339G NT98566 |
Impact and consequences:
Causes the device to restart inexplicably.
Vulnerability Scoring:
none.
Technical details:
Vulnerability details:
The API parameter injection issue causes the device to crash and then restart.
Temporary workaround:
This API requires authentication and can properly defend against attacks. No circumvention is done for now and will be updated with the version plan.
Solution and version update plan:
Solution:
The version is implemented according to the version plan , and parameter verification and exception throwing are added to the API.
Old versions will not be updated.
Version update plan:
Updated from C1.3 to solve the problem.
Version acquisition method:
None
Vulnerability information sources and vulnerability exploitation:
We are currently not aware of any other public channels publishing the vulnerabilities mentioned in this article, nor are we aware of any cases where the vulnerabilities have been maliciously exploited.
Technical support channels:
None
Security Advisory Version Revision Information:
This vulnerability has been fixed in N VR and I PC since version C1.3 .
FAQs:
None