An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD exposes a Telnet service (port 23) with undocumented, default credentials. The Telnet service is enabled by default and is not disclosed or configurable via the device’s web interface or user manual. An attacker with network access can authenticate using default credentials and gain root-level shell access to the device. The affected firmware version is AppFHE1_V1.0.6.0 (Kernel: KerFHE1_PTZ_WIFI_V3.1.1, Hardware: HwFHE1_WF6_PTZ_WIFI_20201218). No official fix or firmware update is available, and the vendor could not be contacted. This vulnerability allows for remote code execution and privilege escalation.
                
            CVSS
                No CVSS.
References
                    Configurations
                    No configuration.
History
                    15 Jul 2025, 13:14
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
11 Jul 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-11 19:15
Updated : 2025-07-15 13:14
NVD link : CVE-2025-7503
Mitre link : CVE-2025-7503
CVE.ORG link : CVE-2025-7503
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
