Description
Certain IP Camera models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.
Published: 2026-01-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Certain Merit LILIN IP Camera models are vulnerable to operating‑system command injection. An attacker who has authenticated access to the device can supply arbitrary commands that the host operating system will execute, potentially giving the attacker full control of the camera and its underlying system. The weakness is a classic OS command injection flaw (CWE-78).

Affected Systems

The affected product family includes Merit LILIN IPD, IPR, LD, LR, P2, P3, P6, V1, and Z7. The IPD, IPR, LD, and LR models are no longer supported and should be replaced. All remaining models are still supported but must receive the firmware update identified in advisory M00176.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity; however, the EPSS score is less than 1%, reflecting a very low likelihood of exploitation observed to date. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated remote access, suggesting the attack vector is network‑based against the management interface. While the exploitation probability is low, the impact of successful exploitation is complete control over the device.

Generated by OpenCVE AI on April 18, 2026 at 07:02 UTC.

Remediation

Vendor Solution

The IPD/IPR/LD/LR models are no longer supported and replacement is recommended. For the remaining affected models, please refer to the official advisory(M00176) to update the firmware.


OpenCVE Recommended Actions

  • Apply the firmware update described in advisory M00176 to all non‑IPD/IPR/LD/LR Merit LILIN models that remain in service.
  • Replace the unsupported IPD, IPR, LD, and LR devices with supported replacements.
  • Restrict network access to the camera’s management interface using firewall or VLAN rules to limit exposure to trusted hosts.

Generated by OpenCVE AI on April 18, 2026 at 07:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 12 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 07:00:00 +0000

Type Values Removed Values Added
Description Certain IP Camera models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.
Title Merit LILIN|IP Camera - OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2026-01-16T02:09:56.328Z

Reserved: 2026-01-12T03:07:26.033Z

Link: CVE-2026-0855

cve-icon Vulnrichment

Updated: 2026-01-12T14:55:18.043Z

cve-icon NVD

Status : Deferred

Published: 2026-01-12T07:16:19.840

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:15:25Z

Weaknesses