9.8
CVSSv3

CVE-2025-1316

CVSSv4: 9.3 | CVSSv3: 9.8 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.70284 | KEV: Exploitation Reported
Published: 05/03/2025 Updated: 25/03/2025

Vulnerability Summary

Remote Code Execution in Edimax IC-7100 Network Camera via Request Manipulation

Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

edimax ic-7100 ip camera

edimax ic-7100 firmware

Github Repositories

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)

CVE-2025-1316 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78) Description Edimax IC-7100 does not properly neutralize requests An attacker can create specially crafted requests to achieve remote code execution on the device Install git clone githubcom/slockit/CVE-2025-1316git cd CVE-2025-1316 sudo chmod +x

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)

CVE-2025-1316 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78) Overview A critical vulnerability in the Edimax IC-7100 network camera where the device fails to properly neutralize incoming requests, enabling remote code execution through specially crafted requests Details CVE ID: CVE-2025-1316 Published:03/04/202

Recent Articles

Unpatched Edimax IP camera flaw actively exploited in botnet attacks
BleepingComputer • Bill Toulas • 07 Mar 2025

Unpatched Edimax IP camera flaw actively exploited in botnet attacks By Bill Toulas March 7, 2025 01:36 PM 0 A critical command injection vulnerability impacting the Edimax IC-7100 IP camera is currently being exploited by botnet malware to compromise devices. The flaw was discovered by Akamai researchers, who confirmed to BleepingComputer that the flaw is exploited in attacks that are still ongoing. Akamai researcher Kyle Lefton told BleepingComputer that they will provide more technical detail...