CVE-2025-66176
Published: 13 January 2026
Summary
CVE-2025-66176 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Hikvision Ds-K1T331 Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 1.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely identification, reporting, and remediation of flaws such as this stack overflow vulnerability through patching unpatched Hikvision devices.
SI-10 mandates validation of incoming network packets to the device Search and Discovery feature, preventing specially crafted packets from triggering the stack overflow.
SC-7 enforces network boundaries and segmentation to restrict adjacent LAN access, limiting unauthenticated attackers' ability to send crafted packets to the vulnerable feature.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack overflow in network-accessible Search/Discovery service allows unauthenticated adjacent-network RCE/DoS, directly enabling remote service exploitation (T1190/T1210).
NVD Description
There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets…
more
to an unpatched device.
Deeper analysisAI
CVE-2025-66176 is a stack overflow vulnerability (CWE-121) affecting the device Search and Discovery feature in Hikvision Access Control Products. Published on 2026-01-13, it carries a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
An unauthenticated attacker on the same local area network (LAN) can exploit this vulnerability by sending specially crafted packets to an unpatched device, causing it to malfunction. The adjacent network access vector, low attack complexity, and lack of required privileges or user interaction make it accessible to local adversaries, with high impacts across confidentiality, integrity, and availability.
For mitigation, refer to advisories from Hikvision at https://www.hikvision.com/en/support/cybersecurity/security-advisory/buffer-overflow-vulnerabilities-in-some-hikvision-products/ and Talos Intelligence at https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2281, which detail patching and remediation for affected products.
Details
- CWE(s)