VYPR
Medium severity6.5NVD Advisory· Published Mar 27, 2026· Updated May 19, 2026

CVE-2025-69988

CVE-2025-69988

Description

BS Producten Petcam 33.1.0.0818 is vulnerable to Incorrect Access Control. An unauthenticated attacker in physical proximity can associate with this open network. Once connected, the attacker gains access to the camera's private network interface and can retrieve sensitive information, including the live video and audio stream, without providing credentials.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

BS Producten Petcam 33.1.0.0818 exposes an unencrypted Wi-Fi access point, allowing any nearby attacker to connect and access the live audio/video stream without authentication.

Vulnerability

Overview The BS Producten Petcam in version 33.1.0.0818 suffers from an incorrect access control vulnerability (CWE-306) in its "Local Mode" network configuration. When activated, the device broadcasts an open Wi-Fi access point with the SSID pattern CLOUDCAM_[MAC_SUFFIX] [1]. No wireless security (WPA/WPA2/WPA3) is enforced, and no authentication is required to join the network [1].

Exploitation

Details An unauthenticated attacker in physical proximity can discover and connect to the open wireless network. After association, the device assigns an IP address via DHCP, placing the attacker on the same subnet as the camera's internal services [1]. Services such as an RTSP stream on port 554 and a custom API on port 8001 are exposed [1]. The live video and audio feed can be accessed without providing any credentials [1].

Impact

Successful exploitation leads to a complete loss of confidentiality. An attacker can monitor the camera's live video and audio streams in real time, as well as interact with the internal API, potentially exposing further sensitive information [1].

Mitigation

The last tested version is 33.1.0.0818, and it is unknown whether later updates address this issue [1]. Users should check with the vendor for patched firmware or apply network-level controls (e.g., disabling the open AP if not needed). The vulnerability has a CVSS v3 base score of 6.2 (medium) with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.