Authenticated Remote Command Execution in Hikvision Wireless Access Points
CVE-2025-39240

7.2HIGH

Key Information:

Vendor

Hikvision

Vendor
CVE Published:
13 June 2025

What is CVE-2025-39240?

Certain models of Hikvision Wireless Access Points are prone to a vulnerability that allows authenticated attackers to execute arbitrary commands remotely. This security flaw stems from inadequate input validation, enabling individuals with valid credentials to send specially crafted packets to the affected devices. Successful exploitation could lead to significant security breaches, allowing unauthorized operations on the device and potentially compromising the entire network.

Affected Version(s)

DS-3WAP521-SI V1.1.5400 build240814(E2254)and the versions prior to it

DS-3WAP522-SI V1.1.5402 build241014(E2254P02)and the versions prior to it

DS-3WAP621E-SI V1.1.5400 build240814(E2254)and the versions prior to it

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

exzettabyte
.
CVE-2025-39240 : Authenticated Remote Command Execution in Hikvision Wireless Access Points