Description
An OS command injection vulnerability exists in AVTECH DVR, NVR, and IP camera devices within the adcommand.cgi endpoint, which interfaces with the ActionD daemon. Authenticated users can invoke the DoShellCmd operation, passing arbitrary input via the strCmd parameter. This input is executed directly by the system shell without sanitation allowing attackers to execute commands as the root user.
Published: 2025-07-01
Score: 9.4 Critical
EPSS: 1.8% Low
KEV: No
Impact: Root-level Remote Command Execution
Action: Apply Patch
AI Analysis

Impact

An authenticated user can call the DoShellCmd operation through the adcommand.cgi endpoint on AVTECH DVR, NVR, and IP camera devices. The strCmd parameter is passed unfiltered to the system shell, enabling arbitrary OS command execution with the privileges of the ActionD daemon. The result is full compromise of the device as root, allowing an attacker to modify, delete, or exfiltrate data, install persistent malware, or use the device in a larger attack chain. The weakness reflects improper input validation and unsafe command construction (CWE-20, CWE-78).

Affected Systems

AVTECH IP camera, DVR, and NVR devices.

Risk and Exploitability

The CVSS score of 9.4 classifies this flaw as critical, indicating exploitation would give an attacker total control over the affected device. The EPSS score of 2% suggests that, while the vulnerability exists, it is currently seldom exploited in the wild. The vendor has not listed this issue in the CISA KEV catalog. Exploitation requires valid credentials, so the attack vector is typically internal or involves phishing to gain authenticated access. Once authenticated, an attacker can trigger any shell command, resulting in a full root compromise.

Generated by OpenCVE AI on April 28, 2026 at 11:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest firmware or vendor patch that sanitizes input for the adcommand.cgi endpoint or removes the DoShellCmd feature.
  • If a patch is not yet available, restrict or disable authentication for the ActionD daemon and expose the endpoint only to trusted internal networks using network segmentation and firewall rules.
  • Consider disabling the ActionD daemon entirely or replacing it with a secure alternative to eliminate the command injection vector.
  • Implement routine vulnerability scans of AVTECH devices and monitor for anomalous system shell activity in logs.

Generated by OpenCVE AI on April 28, 2026 at 11:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19643 An OS command injection vulnerability exists in AVTECH DVR, NVR, and IP camera devices within the adcommand.cgi endpoint, which interfaces with the ActionD daemon. Authenticated users can invoke the DoShellCmd operation, passing arbitrary input via the strCmd parameter. This input is executed directly by the system shell without sanitation allowing attackers to execute commands as the root user.
History

Wed, 02 Jul 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists in AVTECH DVR, NVR, and IP camera devices within the adcommand.cgi endpoint, which interfaces with the ActionD daemon. Authenticated users can invoke the DoShellCmd operation, passing arbitrary input via the strCmd parameter. This input is executed directly by the system shell without sanitation allowing attackers to execute commands as the root user.
Title AVTECH IP camera, DVR, and NVR Devices Authenticated Root Command Execution
Weaknesses CWE-20
CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:16.960Z

Reserved: 2025-04-15T19:15:22.548Z

Link: CVE-2025-34055

cve-icon Vulnrichment

Updated: 2025-07-01T18:33:17.019Z

cve-icon NVD

Status : Deferred

Published: 2025-07-01T15:15:24.053

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-34055

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T11:15:26Z

Weaknesses