Published:2025/07/25 Last Updated:2025/07/25
JVNVU#97303438
TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection
Overview
VIGI NVR1104H-4P and VIGI NVR2016H-16MP provided by TP-Link Systems Inc. contain multiple OS command injection vulnerabilities.
Products Affected
- VIGI NVR1104H-4P firmware versions prior to "VIGI NVR1104H-4P(UN)_V1_1.1.5 Build 250518"
- VIGI NVR2016H-16MP firmware versions prior to "VIGI NVR2016H-16MP(UN)_V2_1.3.1 Build 250407"
Description
VIGI NVR1104H-4P and VIGI NVR2016H-16MP provided by TP-Link Systems Inc. contain multiple vulnerabilities listed below.
- OS command injection (CWE-78)
- CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.5
- CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score 6.8
- CVE-2025-7723
- OS command injection (CWE-78)
- CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.7
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 8.8
- CVE-2025-7724
Impact
- An arbitrary OS command may be executed by the user who can log in to the device (CVE-2025-7723)
- An arbitrary OS command may be executed by an attacker (CVE-2025-7724)
Solution
Update the Firmware
Update the firmware to the latest version according to the information provided by the developer.
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.