PT-2025-9719 · Edimax · Edimax Ic-7100
Published
2025-03-04
·
Updated
2025-09-08
·
CVE-2025-1316
CVSS v3.1
10
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Edimax IC-7100
**Description:**
The Edimax IC-7100 IP camera is vulnerable to a command injection flaw that allows for remote code execution. This vulnerability is actively exploited by Mirai-based botnets, beginning in May 2024, leveraging default credentials for unauthorized access. The device is no longer supported by the vendor, and no patch is available.
**Recommendations:**
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
OS Command Injection
Weakness Enumeration
Related Identifiers
BDU:2025-02451
CVE-2025-1316
Affected Products
Edimax Ic-7100
References · 591
- https://bdu.fstec.ru/vul/2025-02451 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-1316 · Security Note
- https://edimax.com/edimax/post/post/data/edimax/global/press_releases/4801 · Security Note
- https://twitter.com/Castrohackz/status/1959447687797063972 · Twitter Post
- https://twitter.com/SNAPHACKSPY1/status/1960150437086306696 · Twitter Post
- https://twitter.com/davidkoepi/status/1898660322036367631 · Twitter Post
- https://twitter.com/CveFindCom/status/1897074997035745428 · Twitter Post
- https://twitter.com/regular_cyber12/status/1925950654775791900 · Twitter Post
- https://twitter.com/space_x_hacker/status/1942701395997778079 · Twitter Post
- https://twitter.com/Astrah_Hackz/status/1958571781867897034 · Twitter Post
- https://twitter.com/CyberSpectretec/status/1942511425273868640 · Twitter Post
- https://twitter.com/ethanhack_/status/1958576233773490281 · Twitter Post
- https://twitter.com/cyber_defense5/status/1960538070123421835 · Twitter Post
- https://twitter.com/snaphacktech/status/1959002168654012572 · Twitter Post
- https://twitter.com/Astrah_Hackz/status/1958626678634115097 · Twitter Post