CVE-2019-25247
Description
Beward N100 H.264 VGA IP Camera M2.1.6 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without proper request validation. Attackers can craft a malicious web page with a hidden form to add an admin user by tricking a logged-in user into submitting the form.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Beward N100 IP Camera firmware M2.1.6 is vulnerable to CSRF, allowing an attacker to add an admin user by tricking an authenticated admin into submitting a crafted form.
Vulnerability
Overview
The Beward N100 H.264 VGA IP Camera running firmware version M2.1.6 contains a cross-site request forgery (CSRF) vulnerability in its web interface. The application fails to perform any validity checks on HTTP requests, allowing actions to be executed without a unique token or other CSRF protection mechanisms [1][3]. The root cause is the lack of request validation for sensitive administrative operations.
Attack
Vector
An attacker can exploit this vulnerability by hosting a malicious HTML page that contains a hidden form. When a logged-in administrator visits this page (via phishing, cross-site scripting, or other social engineering), the form automatically submits a request to the camera's CGI endpoint at /cgi-bin/admin/param with parameters to add a new user. The form includes a Base64-encoded username:password credential pair along with a privilege flag (01000001 for admin), enabling the attacker to create a new administrator account without the victim's knowledge [3]. The only prerequisite is that the victim is authenticated to the camera's web interface at the time of the attack.
Impact
Successful exploitation allows an attacker to gain persistent administrative access to the IP camera. This can lead to full compromise of the device, including the ability to view live video feeds, modify configuration settings, disable the device, or use it as a pivot point within the network. The attack requires no authentication on the attacker's part, only the victim's active session [1][3].
Mitigation
Status
The vulnerability was publicly disclosed in January 2019 via Zero Science Lab (ZSL-2019-5510) and was subsequently published on Exploit-DB [3]. As of the CVE publication date (December 2025), users should check for firmware updates from Beward that address this CSRF issue. If no patch is available, mitigating actions include restricting access to the camera's web interface to trusted networks only, using a reverse proxy with CSRF protection, or ensuring administrators do not browse untrusted sites while logged into the camera [2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = M2.1.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.