In this episode, we examine the alarming discovery of critical security vulnerabilities in Dahua smart cameras, one of the world’s most widely deployed surveillance systems. Researchers at Bitdefender uncovered two zero-click flaws — CVE-2025-31700 and CVE-2025-31701 — that allow unauthenticated remote attackers to gain root access to Dahua devices. Exploited through the ONVIF protocol and an undocumented RPC upload endpoint, these flaws bypass integrity checks, enabling attackers to install malicious payloads, create persistent implants, and hijack surveillance systems without user interaction.
The affected Dahua camera models, including popular IPC and SD series, are commonly used in retail, warehouses, residential security, and critical infrastructure, meaning millions of environments could be exposed. Dahua has since released patches, but experts stress that updating firmware is only part of the solution. With IoT devices like IP cameras notoriously vulnerable, leaving systems unpatched or exposed to the internet can lead to devastating consequences, including data breaches, surveillance hijacking, and use of compromised cameras in botnet operations.
We’ll also explore:
This case underscores a sobering reality: as IoT adoption grows, attackers are increasingly targeting devices once considered “low risk” — turning everyday surveillance tools into gateways for cyber intrusion.
#Dahua #Bitdefender #IoTSecurity #SmartCameras #CVE202531700 #CVE202531701 #ONVIF #UPnP #Cybersecurity #FirmwareUpdate #SurveillanceSecurity #IoTVulnerabilities #RPCExploit #RootAccess #Botnets
En liten tjänst av I'm With Friends. Finns även på engelska.