Description
Some Hikvision Wireless Access Points are vulnerable to authenticated command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.
Published: 2026-01-30
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Some Hikvision Wireless Access Points allow attackers who possess valid credentials to send specially crafted packets that include malicious commands. The insufficient validation of input data enables arbitrary command execution on the affected devices, potentially giving attackers full control over the device functions and networks they manage. This flaw can be exercised as a command injection vulnerability, classified as CWE‑78, allowing a remote authenticated attacker to execute any commands supported by the device operating system.

Affected Systems

Hikvision models DS‑3WAP521‑SI, DS‑3WAP522‑SI, DS‑3WAP621E‑SI, DS‑3WAP622E‑SI, DS‑3WAP622G‑SI, and DS‑3WAP623E‑SI are known to be affected. The vulnerability applies to firmware versions that have not yet been patched by Hikvision as described in their cybersecurity advisory.

Risk and Exploitability

The CVSS score of 7.2 highlights a high severity risk, while the EPSS score of less than 1% indicates a very low probability of exploitation in the wild at present. The vulnerability is not listed in CISA’s KEV catalog, which suggests that it is not tied to an active, publicly known exploit. However, because the flaw requires authentication, any compromised account or weak default credential could provide an attacker immediate local or remote control, depending on network configuration. The attack vector is likely restricted to an authenticated user; an attacker who can gain legitimate access to the device’s management interface can trigger the vulnerability simply by sending crafted network packets.

Generated by OpenCVE AI on April 18, 2026 at 14:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device firmware to the latest version provided by Hikvision that resolves the input validation issue.
  • If a patch is not available, block or restrict traffic to the device’s management protocols from untrusted networks and limit the use of the exposed services to only those necessary for operation.
  • Enforce strong, unique credentials for all user accounts and disable the default accounts left enabled on the device.

Generated by OpenCVE AI on April 18, 2026 at 14:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
Title Authenticated Command Execution in Hikvision Wireless Access Points

Fri, 27 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Hikvision
Hikvision ds-3wap521-si
Hikvision ds-3wap522-si
Hikvision ds-3wap621e-si
Hikvision ds-3wap622e-si
Hikvision ds-3wap622g-si
Hikvision ds-3wap623e-si
Vendors & Products Hikvision
Hikvision ds-3wap521-si
Hikvision ds-3wap522-si
Hikvision ds-3wap621e-si
Hikvision ds-3wap622e-si
Hikvision ds-3wap622g-si
Hikvision ds-3wap623e-si

Fri, 30 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
Description Some Hikvision Wireless Access Points are vulnerable to authenticated command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Hikvision Ds-3wap521-si Ds-3wap522-si Ds-3wap621e-si Ds-3wap622e-si Ds-3wap622g-si Ds-3wap623e-si
cve-icon MITRE

Status: PUBLISHED

Assigner: hikvision

Published:

Updated: 2026-02-27T14:49:22.572Z

Reserved: 2026-01-08T05:49:12.677Z

Link: CVE-2026-0709

cve-icon Vulnrichment

Updated: 2026-01-30T12:13:52.114Z

cve-icon NVD

Status : Deferred

Published: 2026-01-30T11:15:55.530

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0709

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:30:02Z

Weaknesses