PT-2025-30546 · Dahua · Dahua Ip Products
Published
2025-07-23
·
Updated
2025-08-01
·
CVE-2025-31701
8.1
High
Base vector | Vector | AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Dahua products (affected versions not specified)
**Description:**
A buffer overflow vulnerability has been identified in Dahua products. Attackers can exploit this issue by sending specially crafted malicious packets, potentially leading to service disruption, such as crashes, or remote code execution (RCE). Address Space Layout Randomization (ASLR), a security mechanism present in some devices, may reduce the likelihood of successful RCE exploitation. However, denial-of-service (DoS) attacks remain a concern.
**Recommendations:**
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
DoS
RCE
Buffer Overflow
Weakness Enumeration
Related Identifiers
Affected Products
References · 13
- https://nvd.nist.gov/vuln/detail/CVE-2025-31701 · Security Note
- https://t.me/pentestingnews/65058 · Telegram Post
- https://twitter.com/Andrewkek77/status/1950560238039453855 · Twitter Post
- https://twitter.com/fridaysecurity/status/1948174936063062124 · Twitter Post
- https://t.me/cveNotify/129953 · Telegram Post
- https://t.me/CVEtracker/28474 · Telegram Post
- https://twitter.com/TweetThreatNews/status/1950594442102026708 · Twitter Post
- https://dahuasecurity.com/aboutUs/trustedCenter/details/775 · Note
- https://t.me/true_secator/7292 · Telegram Post
- https://twitter.com/VulmonFeeds/status/1947924564349993432 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1948201920314921268 · Twitter Post
- https://twitter.com/dCypherIO/status/1950904320246919176 · Twitter Post
- https://twitter.com/CVEnew/status/1947919999009444184 · Twitter Post