Cyber Posture

CVE-2025-1739

High

Published: 27 February 2025

Published
27 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0004 12.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

An Authentication Bypass vulnerability has been found in Trivision Camera NC227WF v5.8.0 from TrivisionSecurity. This vulnerability allows an attacker to retrieve administrator's credentials in cleartext by sending a request against the server using curl with random credentials to "/en/player/activex_pal.asp" and successfully authenticating the application.

Security Summary

CVE-2025-1739 is an authentication bypass vulnerability (CWE-288) in Trivision Camera NC227WF version 5.8.0 from Trivision Security. The issue enables an attacker to retrieve administrator credentials in cleartext by sending a request to the "/en/player/activex_pal.asp" endpoint using curl with random credentials, which successfully authenticates the application. Published on 2025-02-27, it carries a CVSS v3.1 base score of 7.1 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).

An unauthenticated attacker (PR:N) with adjacent network access (AV:A) can exploit this vulnerability with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows retrieval of administrator credentials in cleartext, resulting in high confidentiality impact (C:H), low integrity impact (I:L), and no availability impact (A:N), effectively bypassing authentication controls.

The INCIBE-CERT advisory on multiple vulnerabilities in Trivision Camera NC227WF, available at https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-trivision-camera-nc227wf, provides further details on this and related issues.

Details

CWE(s)
CWE-288

References