Skip to content

Security flaw in Dahua CCTVs allows remote access

  • by
  • 2 min read

Cybersecurity researchers have discovered several critical security vulnerabilities in the firmware of Dahua’s Hero C1 smart camera series. If exploited, these vulnerabilities allow hackers to run malicious commands on the device remotely, effectively taking it over.

The vulnerabilities were found by security researchers at Bidefender and were verified on a Dahua Hero C1 (DH-H4C) running firmware version V2.810.9992002.0.R (Build Date: 2024-01-23) with ONVIF version 21.06 and Web UI version V3.2.1.1452137. This was also the latest firmware version available for the camera at the time of testing.

Specifically, the following two vulnerabilities were discovered:

  • CVE-2025-31700: A stack-based buffer overflow bug in the ONVIF handler on port 80. The vulnerability is rated 8.1 on the CVSS scale and can be exploited without authentication, allowing hackers to remotely overwrite the onboard memory and run malicious code on the device.
  • CVE-2025-31701: This also has a CVSS score of 8.1 and affects an undocumented PRC upload endpoint. If exploited, hackers can overwrite global variables and intercept system calls via specifically crafted data, enabling full remote code execution.
This is an image of cctv surveillance camera 2

These vulnerabilities were reported to the Dahua security team in March 2025. The team then ran an internal audit and found that the IPC-1XXX Series, IPC-2XXX Series, IPC-WX Series, IPC-ECXX Series, SD3A Series, SD2A Series, SD3D Series, SDT2A Series, and SD2C Series with firmware versions older than April 16, 2025, were also vulnerable. Dahua’s team confirmed the reports as valid on April 1, 2025, and released patches for affected devices on July 7.

Dahua camera users are advised to apply the latest patches available as soon as possible and avoid exposing the web interface of the vulnerable models to the internet. Use of UPnP and port forwarding is also discouraged.

In the News: Hackers are targeting Python developers with fake PyPI sites

Yadullah Abidi

Yadullah Abidi

Yadullah is a Computer Science graduate who writes/edits/shoots/codes all things cybersecurity, gaming, and tech hardware. When he's not, he streams himself racing virtual cars. He's been writing and reporting on tech and cybersecurity with websites like Candid.Technology and MakeUseOf since 2018. You can contact him here: yadullahabidi@pm.me.

>