The vendor did not respond in any way. Only version 1.1.0.18 was tested, other versions might be vulnerable as well.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://cert.pl/en/posts/2025/10/CVE-2025-53701 |
|
Fri, 24 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vilar
Vilar vs-ipc1002 |
|
| Vendors & Products |
Vilar
Vilar vs-ipc1002 |
Thu, 23 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vilar VS-IPC1002 IP cameras are vulnerable to Reflected XSS (Cross-site Scripting) attacks, because parameters in GET requests sent to /cgi-bin/action endpoint are not sanitized properly, making it possible to target logged in admin users. The vendor did not respond in any way. Only version 1.1.0.18 was tested, other versions might be vulnerable as well. | |
| Title | XSS vulnerability in Vilar VS-IPC1002 IP cameras | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-10-23T14:56:20.217Z
Reserved: 2025-07-08T14:49:12.283Z
Link: CVE-2025-53701
Updated: 2025-10-23T14:56:13.702Z
Status : Received
Published: 2025-10-23T14:15:39.107
Modified: 2025-10-23T14:15:39.107
Link: CVE-2025-53701
No data.
OpenCVE Enrichment
Updated: 2025-10-24T10:17:08Z