During the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.
The vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Oct 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-77 |
Fri, 03 Oct 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-78 |
Thu, 06 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 06 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. During the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection. The vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well. | |
Title | Command Injection in Smartwares cameras | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-10-03T08:52:55.831Z
Reserved: 2025-02-20T14:05:38.748Z
Link: CVE-2024-13892

Updated: 2025-03-06T14:48:04.580Z

Status : Awaiting Analysis
Published: 2025-03-06T14:15:35.453
Modified: 2025-10-03T09:15:32.980
Link: CVE-2024-13892

No data.

No data.