Impact
The vulnerability allows an attacker who can authenticate to the DVRIP protocol to inject shell metacharacters into the HostName configuration field, causing the device's firmware to invoke the system() function with that string. This results in OS command execution with root privileges, enabling full control over the device and compromising confidentiality, integrity and availability.
Affected Systems
The affected devices are Xiongmai DVR/NVR models AHB7008T-MH-V2 and NBD7024H-P running the Sofia 4.03.R11 firmware. No other versions or models are listed as impacted.
Risk and Exploitability
The CVSS score of 8.8 reflects high severity. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attacker must first authenticate to the DVRIP protocol on TCP port 34567. Once authenticated, a crafted HostName value can trigger the vulnerable system() call, giving the attacker unrestricted root access to the underlying operating system.
OpenCVE Enrichment