OS Command Injection Vulnerability in TVT DVRs via Cross Web Server
CVE-2025-34036

10CRITICAL

Key Information:

Status
Vendor
CVE Published:
24 June 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-34036?

An OS command injection vulnerability is present in white-labeled DVRs produced by TVT. This flaw resides in the Cross Web Server, which listens on TCP ports 81 and 82, and is tied to the web interface's failure to properly sanitize input within the URI path used for language extraction. When a request is made to /language/[lang]/index.html, the server processes the unsanitized [lang] parameter in a tar extraction command, leading to the potential for an unauthenticated remote attacker to execute arbitrary commands as the root user.

Affected Version(s)

CCTV-DVR 0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ophir Harpaz (k1p0d)
.
CVE-2025-34036 : OS Command Injection Vulnerability in TVT DVRs via Cross Web Server