Cyber Posture

CVE-2025-66049

High

Published: 09 January 2026

Published
09 January 2026
Modified
14 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0007 21.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66049 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Vivotek Ip7137 Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306

Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.

addresses: CWE-306

Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.

addresses: CWE-306

Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.

addresses: CWE-306

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-306

Auditing sessions makes it possible to detect access to critical functions without required authentication.

addresses: CWE-306

The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.

addresses: CWE-306

Certification assesses that critical functions have required authentication controls in place.

addresses: CWE-306

Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1125 Video Capture Collection
An adversary can leverage a computer's peripheral devices (e.
Why these techniques?

Missing authentication on public RTSP service directly enables remote exploitation of a network-exposed device (T1190) to capture live video feeds (T1125).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Vivotek IP7137 camera with firmware version 0200a is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. This allows unauthorized users with network access to view…

more

the camera's feed, potentially compromising user privacy and security. The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

Deeper analysisAI

CVE-2025-66049 is an information disclosure vulnerability affecting the Vivotek IP7137 IP camera running firmware version 0200a. The issue stems from a lack of authentication in the RTSP protocol service listening on TCP port 8554, enabling unauthorized access to live camera footage. This flaw, classified under CWE-306 (Missing Authentication for Critical Function), has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with low complexity and no privileges required.

Any attacker with network access to the affected camera can exploit this vulnerability by connecting to port 8554 via RTSP, bypassing authentication entirely to stream and view real-time video feeds. No user interaction or special privileges are needed, making it remotely exploitable over the network. Successful exploitation compromises user privacy and physical security by exposing potentially sensitive surveillance footage.

The sole advisory reference at https://cert.pl/posts/2026/01/CVE-2025-66049 notes that the vendor has not responded to the CNA, and all firmware versions may be affected. As the IP7137 has reached end-of-life, no patches or fixes are expected, leaving mitigation reliant on network segmentation, firewall rules blocking port 8554, or device replacement.

Details

CWE(s)

Affected Products

vivotek
ip7137 firmware
0200a

CVEs Like This One

CVE-2025-66052Same product: Vivotek Ip7137
CVE-2025-66050Same product: Vivotek Ip7137
CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-27642Shared CWE-306
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-3498Shared CWE-306
CVE-2025-52665Shared CWE-306
CVE-2025-0355Shared CWE-306

References