A critical security vulnerability has been identified in Hangzhou Xiongmai Technology’s XM530 IP Cameras, putting countless commercial facilities at risk.
This severe flaw allows remote attackers to bypass authentication protocols and access sensitive device information easily. The Cybersecurity and Infrastructure Security Agency (CISA) published an official alert regarding the issue on April 23, 2026.
Critical Vulnerability Details
Tracked formally as CVE-2025-65856, this security flaw carries a nearly maximum CVSS v3 score of 9.8 out of 10.
The core issue stems from a missing authentication check for a critical function within the camera’s firmware. If exploited, an unauthenticated attacker can gain remote access to sensitive data and potentially compromise the device.
These IP cameras are deployed worldwide, particularly within commercial sectors, making this a significant target for malicious actors.
While CISA notes that no active exploitation has been reported in the wild yet, the risk remains exceptionally high.
A public Proof of Concept (PoC) exploit has already been authored by security researcher Luis Miranda Acebedo and reported to MITRE.
The availability of this PoC significantly lowers the barrier to entry for potential attackers looking to scan for and exploit vulnerable devices.
Network administrators must immediately audit their environments to identify exposed hardware. The vulnerability currently impacts the following specific Hangzhou Xiongmai Technology hardware and firmware release:
- IP Camera XM530V200_X6-WEQ_8M firmware V5.00.R02.000807D8.10010.346624.S.ONVIF_21.06
To prevent unauthorised access, CISA strongly recommends organisations implement proactive defensive measures rather than waiting for an official firmware patch.
Administrators should prioritize isolating these devices from external threats using the following technical strategies:
- Minimize network exposure by ensuring IP cameras are never directly accessible from the open internet.
- Locate affected devices and control system networks, and secure them behind strict firewalls.
- Isolate camera hardware completely from standard corporate business networks.
- Require updated Virtual Private Networks (VPNs) for any necessary remote administrative access.
CISA reminds organizations to conduct proper impact analyses and risk assessments before deploying new defensive measures.
Additionally, staff should remain vigilant against social engineering and phishing attacks, avoiding unsolicited links or attachments.
Organisations observing suspected malicious activity surrounding these devices should report their findings to CISA for tracking and incident correlation.
Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

