Security Flaws in Dahua Smart Cameras: What You Need to Know
Overview of the Vulnerabilities
Recent findings from cybersecurity experts have highlighted critical security vulnerabilities in the firmware of Dahua smart cameras. If not addressed, these flaws can empower attackers to gain unauthorized control over the affected devices. According to Bitdefender, the vulnerabilities center around the ONVIF protocol and file upload handlers, which can allow unauthenticated users to execute arbitrary commands remotely, thereby taking over the device without any authentication.
Identifying Affected Devices
The vulnerabilities are tracked as CVE-2025-31700 and CVE-2025-31701, both carrying a CVSS score of 8.1, indicating a high severity level. These issues affect several series of Dahua cameras running firmware with build timestamps prior to April 16, 2025. The specific models impacted include:
- IPC-1XXX Series
- IPC-2XXX Series
- IPC-WX Series
- IPC-ECXX Series
- SD3A Series
- SD2A Series
- SD3D Series
- SDT2A Series
- SD2C Series
To check if your device is affected, users can log into the camera’s web interface and navigate to Settings > System Information > Version to view the build time.
The Nature of the Vulnerabilities
Both vulnerabilities are categorized as buffer overflow issues. They could be exploited through specially crafted malicious packets, leading to either a denial-of-service (DoS) incident or remote code execution (RCE). More specifically, CVE-2025-31700 is characterized as a stack-based buffer overflow in the ONVIF request handler, while CVE-2025-31701 relates to an overflow problem in the RPC file upload handler.
Mitigation and Risks
Dahua has stated that some of their devices may have implemented protective measures like Address Space Layout Randomization (ASLR) to diminish the chances of successful RCE exploitation. However, the potential for DoS attacks remains a pressing concern. Given that these camera models are widely used for video surveillance in environments such as retail stores, casinos, and residential locations, the implications of these vulnerabilities can be serious.
Increased Vulnerability for Exposed Devices
Devices that are exposed to the internet through means such as port forwarding or UPnP are at an even greater risk. Successful exploitation of these vulnerabilities could grant an attacker root-level access to the camera, all without requiring any interaction from the user. Because these exploits can bypass firmware integrity checks, attackers could potentially load unsigned payloads or maintain persistence through custom daemons, complicating the cleanup process once a breach occurs.
Conclusion
It’s crucial for users of Dahua smart cameras to understand these vulnerabilities and take immediate action to update their devices. Keeping firmware up to date is an essential strategy in mitigating potential risks associated with these security flaws. By staying informed and proactive, users can better protect their systems from possible attacks that could compromise their personal or organizational safety.


