CVE-2025-35451

9.8 CRITICAL
Published: September 05, 2025 Modified: January 14, 2026
View on NVD

Description

PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-162-10.json
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory
https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-10
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory US Government Resource
https://www.cve.org/CVERecord?id=CVE-2025-35451
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory
https://www.labs.greynoise.io/grimoire/2024-10-31-sift-0-day-rce/
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Exploit Third Party Advisory

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
0.2%
36th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

smtav ptzoptics valuehd multicam-systems