Search criteria
2 vulnerabilities found for ds-k1t201a_firmware by hikvision
CVE-2025-66176 (GCVE-0-2025-66176)
Vulnerability from nvd – Published: 2026-01-13 01:47 – Updated: 2026-01-15 01:56
VLAI?
Summary
There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device.
Severity ?
8.8 (High)
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hikvision | DS-K1T331 |
Affected:
Versions below V3.7.80
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Matt Wiseman of Cisco Talos
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-66176",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-13T14:32:35.447766Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-13T17:28:04.643Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "DS-K1T331",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T341A/K1T341B",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T671/K5671",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T672",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T680",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T981",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T341C",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.3.180"
}
]
},
{
"product": "DS-K1T670/K1T673",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V4.48.0"
}
]
},
{
"product": "DS-K1T8003",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.21"
}
]
},
{
"product": "DS-K1T804A",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.22"
}
]
},
{
"product": "DS-K1T8003/8004",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.21"
}
]
},
{
"product": "DS-K1T804A",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.22"
}
]
},
{
"product": "DS-K1T804B",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.23"
}
]
},
{
"product": "DS-K1T201A/K1T105A",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.3.65"
}
]
},
{
"product": "DS-K1T342/K1T343/K1T344/DS-K1T6QT-F72/F43",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V4.48.0"
}
]
},
{
"product": "DS-K1T8005/DS-K1T808",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.25.40"
}
]
},
{
"product": "DS-K1T320/DS-K1T321",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.9.40"
}
]
},
{
"product": "DS-K1T323/DS-K1T510",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V4.23.41"
}
]
},
{
"product": "DS-K5033",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V4.37.40"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Matt Wiseman of Cisco Talos"
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-15T01:56:32.572Z",
"orgId": "da451dce-859b-4e51-8b87-9c8b60d19b32",
"shortName": "hikvision"
},
"references": [
{
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/buffer-overflow-vulnerabilities-in-some-hikvision-products/"
}
],
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "da451dce-859b-4e51-8b87-9c8b60d19b32",
"assignerShortName": "hikvision",
"cveId": "CVE-2025-66176",
"datePublished": "2026-01-13T01:47:27.191Z",
"dateReserved": "2025-11-24T08:59:35.903Z",
"dateUpdated": "2026-01-15T01:56:32.572Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-66176 (GCVE-0-2025-66176)
Vulnerability from cvelistv5 – Published: 2026-01-13 01:47 – Updated: 2026-01-15 01:56
VLAI?
Summary
There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device.
Severity ?
8.8 (High)
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hikvision | DS-K1T331 |
Affected:
Versions below V3.7.80
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Matt Wiseman of Cisco Talos
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-66176",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-13T14:32:35.447766Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-13T17:28:04.643Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "DS-K1T331",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T341A/K1T341B",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T671/K5671",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T672",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T680",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T981",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.7.80"
}
]
},
{
"product": "DS-K1T341C",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.3.180"
}
]
},
{
"product": "DS-K1T670/K1T673",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V4.48.0"
}
]
},
{
"product": "DS-K1T8003",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.21"
}
]
},
{
"product": "DS-K1T804A",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.22"
}
]
},
{
"product": "DS-K1T8003/8004",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.21"
}
]
},
{
"product": "DS-K1T804A",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.22"
}
]
},
{
"product": "DS-K1T804B",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.4.23"
}
]
},
{
"product": "DS-K1T201A/K1T105A",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V1.3.65"
}
]
},
{
"product": "DS-K1T342/K1T343/K1T344/DS-K1T6QT-F72/F43",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V4.48.0"
}
]
},
{
"product": "DS-K1T8005/DS-K1T808",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.25.40"
}
]
},
{
"product": "DS-K1T320/DS-K1T321",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V3.9.40"
}
]
},
{
"product": "DS-K1T323/DS-K1T510",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V4.23.41"
}
]
},
{
"product": "DS-K5033",
"vendor": "Hikvision",
"versions": [
{
"status": "affected",
"version": "Versions below V4.37.40"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Matt Wiseman of Cisco Talos"
}
],
"descriptions": [
{
"lang": "en",
"value": "There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially crafted packets to an unpatched device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-15T01:56:32.572Z",
"orgId": "da451dce-859b-4e51-8b87-9c8b60d19b32",
"shortName": "hikvision"
},
"references": [
{
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/buffer-overflow-vulnerabilities-in-some-hikvision-products/"
}
],
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "da451dce-859b-4e51-8b87-9c8b60d19b32",
"assignerShortName": "hikvision",
"cveId": "CVE-2025-66176",
"datePublished": "2026-01-13T01:47:27.191Z",
"dateReserved": "2025-11-24T08:59:35.903Z",
"dateUpdated": "2026-01-15T01:56:32.572Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}