LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access
A serious security vulnerability has been discovered in LG Innotek’s LNV5110R camera model that could allow cybercriminals to gain complete administrative control over affected devices.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory on July 24, 2025, warning of a remotely exploitable flaw that affects all versions of the camera model worldwide.
Key Takeaways
1. Critical vulnerability in LG Innotek LNV5110R cameras allows remote admin takeover.
2. No security patches available as product is end-of-life.
3. Network isolation and firewalls are only protection options.
Authentication Bypass Vulnerability (CVE-2025-7742)
The vulnerability, designated as CVE-2025-7742, stems from an authentication bypass using an alternate path or channel (CWE-288).
Security researcher Souvik Kandar discovered that malicious actors can exploit this flaw by uploading specially crafted HTTP POST requests to the device’s non-volatile storage.
This authentication weakness allows attackers to circumvent normal security controls and execute arbitrary commands with administrator-level privileges.
The vulnerability has been assigned a CVSS v3.1 base score of 7.0 with the vector string AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L, indicating high network accessibility but high attack complexity.
Under the newer CVSS v4.0 scoring system, the flaw receives a more severe base score of 8.3 with vector AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N, emphasizing the significant risk to confidentiality.
Successful exploitation of this vulnerability enables remote code execution (RCE), allowing attackers to run arbitrary commands on target devices at the administrator privilege level.
This level of access could enable cybercriminals to manipulate camera feeds, access sensitive surveillance data, or use compromised devices as pivot points for broader network attacks.
The vulnerability particularly threatens commercial facilities and critical infrastructure sectors where these cameras are commonly deployed.
The flaw’s network-accessible nature means attackers can potentially exploit it from anywhere on the internet without requiring physical access to the devices.
However, CISA notes that the vulnerability has high attack complexity, and no known public exploitation targeting this specific flaw has been reported at this time.
Risk Factors | Details |
Affected Products | LG Innotek Camera Model LNV5110R (All versions) |
Impact | – Remote code execution- Administrative access takeover |
Exploit Prerequisites | – Network access to device- High technical complexity- No user interaction required- No prior authentication needed |
CVSS 3.1 Score | 7.0 (High) |
End-of-Life Status
LG Innotek has confirmed that the LNV5110R model is an end-of-life product that will not receive security patches.
Users must rely on defensive measures to minimize exposure, including isolating devices from internet access and implementing network segmentation behind firewalls.
CISA recommends implementing defense-in-depth strategies, using Virtual Private Networks (VPNs) for remote access, and ensuring control system networks remain isolated from business networks.
Organizations should perform proper impact analysis and risk assessment before deploying defensive measures.
Experience faster, more accurate phishing detection and enhanced protection for your business with real-time sandbox analysis-> Try ANY.RUN now
Source link