Hikvision, a leading provider of surveillance and access control systems, faces serious security risks from two newly disclosed stack overflow vulnerabilities.
These flaws, tracked as CVE-2025-66176 and CVE-2025-66177, allow attackers on the same local area network (LAN) to trigger device malfunctions by sending specially crafted packets. Both carry a high CVSS v3.1 base score of 8.8, indicating significant potential impact without requiring authentication.
Security researchers uncovered these issues in Hikvision’s device Search and Discovery feature, a protocol used for network detection.
Exploitation demands only adjacent network access, such as shared Wi-Fi or office LANs, making it a prime target for insiders or opportunistic hackers. An unpatched device could crash entirely, disrupting critical operations in surveillance setups.
| CVE ID | Affected Products | CVSS v3.1 Base Score | Description |
|---|---|---|---|
| CVE-2025-66176 | Partial Access Control Series Products | 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | Stack overflow in Search and Discovery feature |
| CVE-2025-66177 | Partial NVR, DVR, CVR, IPC Series Products | 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | Stack overflow in Search and Discovery feature |
The vector breakdown reveals low complexity: attackers need no privileges (PR:N) and no user interaction (UI:N), with high confidentiality, integrity, and availability impacts (C:H/I:H/A:H).
CVE-2025-66176 was reported by a Cisco Talos Team member, while CVE-2025-66177 came from independent researchers Angel Lozano Alcazar and Pedro Guillen Nuñez. Their disclosures underscore ongoing scrutiny of IoT and surveillance gear, where stack overflows have repeatedly enabled denial-of-service attacks.
Hikvision urges immediate patching. Users can download firmware updates from the official support page. The company emphasizes network segmentation and disabling unused discovery features as interim mitigations.
These flaws arrive amid heightened concerns over video surveillance security. Last year saw similar Hikvision advisories, prompting CISA alerts on supply chain risks. Organizations relying on these devices, from smart buildings to public safety, should prioritize scans using tools like Nmap for exposed services.
Experts warn that unpatched systems could lead to broader incidents, such as surveillance blackouts during emergencies. “LAN-adjacent attacks lower the bar for disruption,” noted a Talos spokesperson. As threats evolve, vendors must accelerate zero-trust implementations in embedded systems.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
