Published:2025/06/27  Last Updated:2025/06/27

JVNVU#93396297
Multiple vulnerabilities in TB-eye network recorders and AHD recorders

Overview

Network recorders and AHD recorders provided by TB-eye Ltd. contain multiple vulnerabilities.

Products Affected

  • XRN-410SN/TE firmware versions Ver2.47b_220119153805 and earlier
  • XRN-810SN/TE firmware versions Ver2.47b_220119153805 and earlier
  • XRN-1610SN/TE firmware versions Ver2.47b_210516234524 and earlier
  • PRN-4011N/TE firmware versions Ver2.51p_231208081715 and earlier
  • HRX-421FN/TE firmware versions Ver3.05.62 and earlier
  • HRX-821/TE firmware versions Ver3.05.62 and earlier
  • HRX-1621/TE firmware versions Ver3.05.62 and earlier
  • HRX-435FN/TE firmware versions Ver5.31.72 and earlier
  • HRX-835/TE firmware versions Ver5.31.72 and earlier
  • HRX-1635/TE firmware versions Ver5.31.72 and earlier
  • XRN-425SFN/TE firmware versions Ver5.31.32 and earlier
  • XRN-426S firmware versions Ver5.33.12 and earlier
  • XRN-820S/TE firmware versions Ver5.34.12 and earlier
  • XRN-1620S/TE firmware versions Ver5.34.12 and earlier
  • XRN-3210R/TE firmware versions Ver5.34.12 and earlier
  • XRN-6410R/TE firmware versions Ver5.34.12 and earlier
  • XRN-6410DR/TE firmware versions Ver5.34.12 and earlier

Description

Network recorders and AHD recorders provided by TB-eye Ltd. contain multiple vulnerabilities listed below.

  • OS command injection (CWE-78)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.6
    • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score 7.2
    • CVE-2025-36529
  • Classic buffer overflow (CWE-120)
    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N Base Score 6.9
    • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Base Score 5.3
    • CVE-2025-41418

Impact

  • An arbitrary OS command may be executed by an attacker who is logging in to the device (CVE-2025-36529)
  • The CGI process may be terminated abnormally by processing a specially crafted request (CVE-2025-41418)

Solution

Update the firmware
Update the firmware to the latest version according to the information provided by the developer.

Apply the workaround
The developer recommends the users to change the administrator password to one hard to guess.

For more information, refer to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Chuya Hayakawa and Ryo Kamino of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-36529
CVE-2025-41418
JVN iPedia