Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR. An attacker could inject malformed data into url input parameters to reboot the NVR. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 01 Oct 2025 02:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Wed, 01 Oct 2025 02:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-755

Tue, 24 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Dec 2024 05:30:00 +0000

Type Values Removed Values Added
Description Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR. An attacker could inject malformed data into url input parameters to reboot the NVR. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
Title Improper Input Validation
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Hanwha_Vision

Published:

Updated: 2025-10-01T01:48:38.916Z

Reserved: 2024-07-23T00:24:03.861Z

Link: CVE-2024-41886

cve-icon Vulnrichment

Updated: 2024-12-24T15:25:24.326Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-24T06:15:34.360

Modified: 2025-10-01T02:15:32.977

Link: CVE-2024-41886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.