Impact
An unauthenticated command injection flaw exists in AVTECH devices accessed via Search.cgi?action=cgi_query. The lack of input sanitization on the username and queryb64str parameters allows attackers to inject shell commands, which are executed with root privileges. This vulnerability is a classic Command Injection (CWE-78) that can lead to full device compromise and unauthorized system control.
Affected Systems
The affected products are AVTECH IP cameras, DVRs, and NVRs. No particular firmware or model versions are listed, but all devices exposing the Search.cgi interface are potentially vulnerable.
Risk and Exploitability
The CVSS score of 10 indicates critical severity, while the EPSS score of 2% indicates a low to moderate current exploitation probability. The flaw is not listed in the CISA KEV catalog. The attack vector is remote, unauthenticated access to the device over the network, and exploitation has been observed by Shadowserver. Attackers can execute arbitrary commands as root, potentially installing backdoors or exfiltrating data.
OpenCVE Enrichment
EUVD