TT-CSIRT – 443.30.07.25 – Vulnerabilities found in some Dahua products
Please be advised that Dahua has released a security update to address two critical buffer overflow vulnerabilities CVE-2025-31700 and CVE-2025-31701 reported by the Bitdefender IoT Research Team.
Impact
- May allow remote code execution (RCE) by unauthenticated attackers.
- Could result in denial-of-service (DoS), such as service crashes.
- Exploitation occurs via specially crafted malicious packets.
- Some devices use ASLR to mitigate RCE risk; however service disruption remains possible despite protective measures.
Affected Products
CVE ID | Affected Models | Affected Version |
CVE-2025-31700 CVE-2025-31701 | IPC-1XXX Series IPC-2XXX Series IPC-WX Series IPC-ECXX Series SD3A Series SD2A Series SD3D Series SDT2A Series SD2C Series | Build time before 2025/04/16 |
Full affected model list:
https://materialfile.dahuasecurity.com/uploads/soft/20250723/Affected-Models.pdf
Solution: Update Firmware
Please upgrade affected devices to the latest firmware version. Options:
- Cloud Upgrade: For compatible devices, updates will be pushed within 30 working days.
- Manual Download:
https://www.dahuasecurity.com/support/downloadCenter - Contact: Dahua Technical Support: psirt@dahuatech.com.
Workaround
- Restrict external access to device web interfaces
- Segment vulnerable devices from public networks
- Monitor for abnormal traffic behaviour
References
https://www.dahuasecurity.com/aboutUs/trustedCenter/details/775
https://nvd.nist.gov/vuln/detail/CVE-2025-31700
https://nvd.nist.gov/vuln/detail/CVE-2025-31701
Additional Links:
https://www.dahuasecurity.com/support/downloadCenter
If you have any queries, comments or require assistance, please feel free to contact TT-CSIRT via contacts@ttcsirt.gov.tt