OS Command Injection in AVTECH Devices via CloudSetup.cgi Management Endpoint
CVE-2016-15047

8.7HIGH

Key Information:

Vendor
CVE Published:
9 October 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2016-15047?

AVTECH devices featuring the CloudSetup.cgi management interface are susceptible to authenticated OS command injection. The exefile parameter within CloudSetup.cgi is inadequately validated, permitting an authenticated attacker to execute arbitrary system commands with root privileges. Exploitation of this vulnerability could lead to complete device control, and depending on the device's configuration and network access, it may result in credential theft, lateral movement within networks, or data exfiltration. Although the vulnerability was reportedly addressed in early 2017, specific versions affected have not been disclosed by AVTECH.

Affected Version(s)

IP Camera, NVR, and DVR Devices *

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Gergely Eberhardt of SEARCH-LAB.hu
.
CVE-2016-15047 : OS Command Injection in AVTECH Devices via CloudSetup.cgi Management Endpoint