- Dahua video surveillance defects identified by Bitdefender affect more than 100 popular security cameras models
- Vulnerabilities allow the execution of the remote code without authentication on local or internet connections
- The company urges the firmware updates and the isolation of the network to avoid exploitation
Bitdefender researchers have announced two critical vulnerabilities affecting a large number of Dahua smart cameras.
The faults, which were corrected in the last update of the firmware, could allow non -authenticated attackers to take total control of the assigned devices.
Dahua confirmed that a total of 126 models have been affected, including several IPC, SD and DH devices, not only the Hero C1 model was reported for the first time.
Patch now
The first of the vulnerabilities, CVE-2025-31700, is a defect in buffer in the firmware of the Dahua camera which can be triggered when the device treats specially designed network packets. If it is used, it could cause a camera plan or, in some cases, allow a distant attacker to execute his own code on the device.
The second, CVE-2025-31701, is another buffer overflow problem also exploitable by malicious craftsmen sent to the network. It can also be used to crush the camera or potentially win a complete remote control depending on the target defenses.
Both can be used to execute arbitrary code with root privileges.
Bitdefender reported the problems in Dahua on March 28, 2025. The manufacturer of Chinese video surveillance equipment recognized the report the next day and validated the conclusions by April 1.
He asked for a little time to prepare a fix for problems, with fixes finally deployed last month, followed by the agreed public disclosure.
Both vulnerabilities can be particularly dangerous for devices accessible from the Internet via port transfer or UPNP, because no authentication is required for possible exploitation.
BitDefender warns that successful attacks could bypass the micrologetal integrity checks and deploy persistent malicious code, which makes cleaning difficult.
Dahua, the second largest CCTV world manufacturer behind Hikvision, was exposed to a meticulous examination in several countries on cybersecurity problems and data confidentiality problems, in particular linked to potential vulnerabilities in its devices connected to the network.
He maintains a team of response to product security incidents (PSIRT) to coordinate with researchers on reported defects, as in the case of these vulnerability disclosure.
He urges all customers who have not yet done so to update their camera firmware per emergency.
For anyone who cannot do it immediately, he advises the disconnection of vulnerable internet access devices, deactivation of UPNP and isolation of cameras on separate networks to reduce risks.
A detailed list of affected models is included in Dahua’s online advice, as well as links to the fixed firmware.
Dahua and Bitdefender devices stressed unresalized devices on the Internet should be considered as main targets.