Browse all 12 CVE security advisories affecting Vivotek. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Vivotek specializes in IP surveillance cameras and video management systems for security monitoring. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and insecure default configurations. The company has faced scrutiny for vulnerabilities in web interfaces and firmware that could allow unauthorized access or system compromise. While no major public security incidents have been widely documented, the 12 recorded CVEs highlight ongoing security challenges in their IoT devices, emphasizing the need for regular patching and network segmentation to mitigate potential exploitation risks in critical infrastructure deployments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-66052 | Command injection in Vivotek IP7137 cameras — IP7137CWE-78 | 7.2 | - | 2026-01-09 |
| CVE-2025-66051 | Path traversal in Vivotek IP7137 cameras — IP7137CWE-22 | 8.1 | - | 2026-01-09 |
| CVE-2025-66050 | No password set for administrative account in Vivotek IP7137 cameras — IP7137CWE-1393 | 9.8 | - | 2026-01-09 |
| CVE-2025-66049 | Unprotected RTSP stream in Vivotek IP7137 cameras — IP7137CWE-306 | 7.5 | - | 2026-01-09 |
This page lists every published CVE security advisory associated with Vivotek. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.