Impact
A flaw in certain Hikvision switch devices permits authenticated users to execute arbitrary system commands. The vulnerability stems from inadequate validation of command payloads that are accepted over the network. If an attacker can supply crafted packets, they can run any code with the privileges of the system account used for authentication, leading to full compromise of the device.
Affected Systems
The affected products are the Hikvision DS-3E1310P-SI, DS-3E1318P-SI, and DS-3E1326P-SI switches. These models were discontinued in December 2023 and are no longer supported; no specific firmware or software version ranges are provided by the advisory.
Risk and Exploitability
The CVSS score of 7.2 indicates a medium‑to‑high severity. Exploitation requires valid credentials, but once authenticated the attacker can perform arbitrary command execution. Because the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, there is no current evidence of widespread exploitation. The attack vector is inferred to be remote over the network, and the flaw is a classic command‑injection weakness.
OpenCVE Enrichment