PT-2025-30546 · Dahua · Dahua Ip Products
Published
2025-07-23
·
Updated
2025-08-04
·
CVE-2025-31701
8.1
High
Base vector | Vector | AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Dahua products (affected versions not specified)
**Description:**
A buffer overflow vulnerability has been discovered in Dahua products. Attackers can exploit this issue by sending specially crafted malicious packets, potentially leading to service disruption, such as crashes, or remote code execution (RCE). Address Space Layout Randomization (ASLR), a security mechanism present in some devices, may reduce the likelihood of successful RCE exploitation, but denial-of-service (DoS) attacks remain a concern.
**Recommendations:**
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
DoS
Buffer Overflow
Weakness Enumeration
Related Identifiers
Affected Products
References · 13
- https://nvd.nist.gov/vuln/detail/CVE-2025-31701 · Security Note
- https://twitter.com/Andrewkek77/status/1950560238039453855 · Twitter Post
- https://twitter.com/dCypherIO/status/1950904320246919176 · Twitter Post
- https://t.me/CVEtracker/28474 · Telegram Post
- https://twitter.com/TweetThreatNews/status/1950594442102026708 · Twitter Post
- https://dahuasecurity.com/aboutUs/trustedCenter/details/775 · Note
- https://twitter.com/fridaysecurity/status/1948174936063062124 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1947924564349993432 · Twitter Post
- https://t.me/true_secator/7292 · Telegram Post
- https://twitter.com/the_yellow_fall/status/1948201920314921268 · Twitter Post
- https://twitter.com/CVEnew/status/1947919999009444184 · Twitter Post
- https://t.me/pentestingnews/65058 · Telegram Post
- https://t.me/cveNotify/129953 · Telegram Post