dahuasecurity CVE Vulnerabilities & Metrics

Focus on dahuasecurity vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About dahuasecurity Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with dahuasecurity. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total dahuasecurity CVEs: 49
Earliest CVE date: 17 Sep 2013, 12:04 UTC
Latest CVE date: 31 Jul 2024, 04:15 UTC

Latest CVE reference: CVE-2024-39950

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 7

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 250.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 250.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical dahuasecurity CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.42

Max CVSS: 10.0

Critical CVEs (≥9): 8

CVSS Range vs. Count

Range Count
0.0-3.9 20
4.0-6.9 18
7.0-8.9 9
9.0-10.0 8

CVSS Distribution Chart

Top 5 Highest CVSS dahuasecurity CVEs

These are the five CVEs with the highest CVSS scores for dahuasecurity, sorted by severity first and recency.

All CVEs for dahuasecurity

CVE-2024-39950 dahuasecurity vulnerability CVSS: 0 31 Jul 2024, 04:15 UTC

A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities to initiate device initialization.

CVE-2024-39949 dahuasecurity vulnerability CVSS: 0 31 Jul 2024, 04:15 UTC

A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash.

CVE-2024-39948 dahuasecurity vulnerability CVSS: 0 31 Jul 2024, 04:15 UTC

A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash.

CVE-2024-39947 dahuasecurity vulnerability CVSS: 0 31 Jul 2024, 04:15 UTC

A vulnerability has been found in Dahua products.After obtaining the ordinary user's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing the device to crash.

CVE-2024-39946 dahuasecurity vulnerability CVSS: 0 31 Jul 2024, 04:15 UTC

A vulnerability has been found in Dahua products.After obtaining the administrator's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing device initialization.

CVE-2024-39945 dahuasecurity vulnerability CVSS: 0 31 Jul 2024, 04:15 UTC

A vulnerability has been found in Dahua products.  After obtaining the administrator's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing the device to crash.

CVE-2024-39944 dahuasecurity vulnerability CVSS: 0 31 Jul 2024, 04:15 UTC

A vulnerability has been found in Dahua products.Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash.

CVE-2023-3836 dahuasecurity vulnerability CVSS: 6.5 22 Jul 2023, 18:15 UTC

A vulnerability classified as critical was found in Dahua Smart Park Management up to 20230713. This vulnerability affects unknown code of the file /emap/devicePoint_addImgIco?hasSubsystem=true. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-3121 dahuasecurity vulnerability CVSS: 2.7 06 Jun 2023, 11:15 UTC

A vulnerability has been found in Dahua Smart Parking Management up to 20230528 and classified as problematic. This vulnerability affects unknown code of the file /ipms/imageConvert/image. The manipulation of the argument fileUrl leads to server-side request forgery. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230800. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2022-45434 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of unauthenticated un-throttled ICMP requests on remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could exploit the victim server to launch ICMP request attack to the designated target host.

CVE-2022-45433 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of unauthenticated traceroute host from remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could get the traceroute results.

CVE-2022-45432 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of unauthenticated search for devices. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated search for devices in range of IPs from remote DSS Server.

CVE-2022-45431 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of unauthenticated restart of remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated restart of remote DSS Server.

CVE-2022-45430 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of unauthenticated enable or disable SSHD service. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could enable or disable the SSHD service.

CVE-2022-45429 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of server-side request forgery (SSRF). An Attacker can access internal resources by concatenating links (URL) that conform to specific rules.

CVE-2022-45428 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of sensitive information leakage. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can obtain the debugging information.

CVE-2022-45427 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of unrestricted upload of file. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can upload arbitrary files.

CVE-2022-45426 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of unrestricted download of file. After obtaining the permissions of ordinary users, by sending a specific crafted packet to the vulnerable interface, an attacker can download arbitrary files.

CVE-2022-45425 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of using of hard-coded cryptographic key. An attacker can obtain the AES crypto key by exploiting this vulnerability.

CVE-2022-45424 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of unauthenticated request of AES crypto key. An attacker can obtain the AES crypto key by sending a specific crafted packet to the vulnerable interface.

CVE-2022-45423 dahuasecurity vulnerability CVSS: 0 27 Dec 2022, 18:15 UTC

Some Dahua software products have a vulnerability of unauthenticated request of MQTT credentials. An attacker can obtain encrypted MQTT credentials by sending a specific crafted packet to the vulnerable interface (the credentials cannot be directly exploited).

CVE-2022-30563 dahuasecurity vulnerability CVSS: 5.8 28 Jun 2022, 14:15 UTC

When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in through ONVIF, he can log in to the device by replaying the user's login packet.

CVE-2022-30562 dahuasecurity vulnerability CVSS: 4.0 28 Jun 2022, 14:15 UTC

If the user enables the https function on the device, an attacker can modify the user’s request data packet through a man-in-the-middle attack ,Injection of a malicious URL in the Host: header of the HTTP Request results in a 302 redirect to an attacker-controlled page.

CVE-2022-30561 dahuasecurity vulnerability CVSS: 4.3 28 Jun 2022, 14:15 UTC

When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in, the attacker could log in to the device by replaying the user's login packet.

CVE-2022-30560 dahuasecurity vulnerability CVSS: 5.8 28 Jun 2022, 14:15 UTC

When an attacker obtaining the administrative account and password, or through a man-in-the-middle attack, the attacker could send a specified crafted packet to the vulnerable interface then lead the device to crash.

CVE-2021-33046 dahuasecurity vulnerability CVSS: 7.5 13 Jan 2022, 21:15 UTC

Some Dahua products have access control vulnerability in the password reset process. Attackers can exploit this vulnerability through specific deployments to reset device passwords.

CVE-2021-33045 dahuasecurity vulnerability CVSS: 10.0 15 Sep 2021, 22:15 UTC

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

CVE-2020-9502 dahuasecurity vulnerability CVSS: 7.5 13 May 2020, 16:15 UTC

Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.

CVE-2019-9682 dahuasecurity vulnerability CVSS: 6.8 13 May 2020, 16:15 UTC

Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.

CVE-2020-9500 dahuasecurity vulnerability CVSS: 4.0 09 Apr 2020, 14:15 UTC

Some products of Dahua have Denial of Service vulnerabilities. After the successful login of the legal account, the attacker sends a specific log query command, which may cause the device to go down.

CVE-2020-9499 dahuasecurity vulnerability CVSS: 6.5 09 Apr 2020, 14:15 UTC

Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down.

CVE-2019-9680 dahuasecurity vulnerability CVSS: 5.0 18 Sep 2019, 19:15 UTC

Some Dahua products have information leakage issues. Attackers can obtain the IP address and device model information of the device by constructing malicious data packets. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18, 2019.

CVE-2019-9679 dahuasecurity vulnerability CVSS: 6.5 18 Sep 2019, 19:15 UTC

Some of Dahua's Debug functions do not have permission separation. Low-privileged users can use the Debug function after logging in. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18,2019.

CVE-2019-9678 dahuasecurity vulnerability CVSS: 5.0 18 Sep 2019, 19:15 UTC

Some Dahua products have the problem of denial of service during the login process. An attacker can cause a device crashed by constructing a malicious packet. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18, 2019.

CVE-2019-9677 dahuasecurity vulnerability CVSS: 7.5 18 Sep 2019, 19:15 UTC

The specific fields of CGI interface of some Dahua products are not strictly verified, an attacker can cause a buffer overflow by constructing malicious packets. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18, 2019.

CVE-2019-9681 dahuasecurity vulnerability CVSS: 5.0 17 Sep 2019, 17:15 UTC

Online upgrade information in some firmware packages of Dahua products is not encrypted. Attackers can obtain this information by analyzing firmware packages by specific means. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18,2019.

CVE-2019-9676 dahuasecurity vulnerability CVSS: 7.2 12 Jun 2019, 15:29 UTC

Buffer overflow vulnerability found in some Dahua IP Camera devices IPC-HFW1XXX,IPC-HDW1XXX,IPC-HFW2XXX Build before 2018/11. The vulnerability exits in the function of redirection display for serial port printing information, which can not be used by product basic functions. After an attacker logs in locally, this vulnerability can be exploited to cause device restart or arbitrary code execution. Dahua has identified the corresponding security problems in the static code auditing process, so it has gradually deleted this function, which is no longer available in the newer devices and softwares. Dahua has released versions of the affected products to fix the vulnerability.

CVE-2017-3223 dahuasecurity vulnerability CVSS: 7.5 24 Jul 2018, 15:29 UTC

Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the 'password' field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera's Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC-HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.

CVE-2017-9317 dahuasecurity vulnerability CVSS: 4.0 23 May 2018, 15:29 UTC

Privilege escalation vulnerability found in some Dahua IP devices. Attacker in possession of low privilege account can gain access to credential information of high privilege account and further obtain device information or attack the device.

CVE-2017-9315 dahuasecurity vulnerability CVSS: 5.0 28 Nov 2017, 19:29 UTC

Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker.

CVE-2017-9316 dahuasecurity vulnerability CVSS: 5.8 27 Nov 2017, 17:29 UTC

Firmware upgrade authentication bypass vulnerability was found in Dahua IPC-HDW4300S and some IP products. The vulnerability was caused by internal Debug function. This particular function was used for problem analysis and performance tuning during product development phase. It allowed the device to receive only specific data (one direction, no transmit) and therefore it was not involved in any instance of collecting user privacy data or allowing remote code execution.

CVE-2017-9314 dahuasecurity vulnerability CVSS: 6.5 13 Nov 2017, 16:29 UTC

Authentication vulnerability found in Dahua NVR models NVR50XX, NVR52XX, NVR54XX, NVR58XX with software before DH_NVR5xxx_Eng_P_V2.616.0000.0.R.20171102. Attacker could exploit this vulnerability to gain access to additional operations by means of forging json message.

CVE-2017-7927 dahuasecurity vulnerability CVSS: 7.5 06 May 2017, 00:29 UTC

A Use of Password Hash Instead of Password for Authentication issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The use of password hash instead of password for authentication vulnerability was identified, which could allow a malicious user to bypass authentication without obtaining the actual password.

CVE-2017-7925 dahuasecurity vulnerability CVSS: 5.0 06 May 2017, 00:29 UTC

A Password in Configuration File issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The password in configuration file vulnerability was identified, which could lead to a malicious user assuming the identity of a privileged user and gaining access to sensitive information.

CVE-2017-7253 dahuasecurity vulnerability CVSS: 9.0 30 Mar 2017, 18:59 UTC

Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a "Component error: login challenge!" message. The second JSON object encountered has a result indicating a successful admin login.

CVE-2017-6432 dahuasecurity vulnerability CVSS: 9.3 09 Mar 2017, 17:59 UTC

An issue was discovered on Dahua DHI-HCVR7216A-S3 3.210.0001.10 build 2016-06-06 devices. The Dahua DVR Protocol, which operates on TCP Port 37777, is an unencrypted, binary protocol. Performing a Man-in-the-Middle attack allows both sniffing and injections of packets, which allows creation of fully privileged new users, in addition to capture of sensitive information.

CVE-2017-6343 dahuasecurity vulnerability CVSS: 9.3 27 Feb 2017, 07:59 UTC

The web interface on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19 allows remote attackers to obtain login access by leveraging knowledge of the MD5 Admin Hash without knowledge of the corresponding password, a different vulnerability than CVE-2013-6117.

CVE-2017-6342 dahuasecurity vulnerability CVSS: 10.0 27 Feb 2017, 07:59 UTC

An issue was discovered on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19. When SmartPSS Software is launched, while on the login screen, the software in the background automatically logs in as admin. This allows sniffing sensitive information identified in CVE-2017-6341 without prior knowledge of the password. This is a different vulnerability than CVE-2013-6117.

CVE-2017-6341 dahuasecurity vulnerability CVSS: 4.3 27 Feb 2017, 07:59 UTC

Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19 send cleartext passwords in response to requests from the Web Page, Mobile Application, and Desktop Application interfaces, which allows remote attackers to obtain sensitive information by sniffing the network, a different vulnerability than CVE-2013-6117.

CVE-2013-6117 dahuasecurity vulnerability CVSS: 7.5 11 Jul 2014, 19:55 UTC

Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2013-5754 dahuasecurity vulnerability CVSS: 10.0 17 Sep 2013, 12:04 UTC

The authorization implementation on Dahua DVR appliances accepts a hash string representing the current date for the role of a master password, which makes it easier for remote attackers to obtain administrative access and change the administrator password via requests involving (1) ActiveX, (2) a standalone client, or (3) unspecified other vectors, a different vulnerability than CVE-2013-3612.

CVE-2013-3615 dahuasecurity vulnerability CVSS: 7.8 17 Sep 2013, 12:04 UTC

Dahua DVR appliances use a password-hash algorithm with a short hash length, which makes it easier for context-dependent attackers to discover cleartext passwords via a brute-force attack.

CVE-2013-3614 dahuasecurity vulnerability CVSS: 9.3 17 Sep 2013, 12:04 UTC

Dahua DVR appliances have a small value for the maximum password length, which makes it easier for remote attackers to obtain access via a brute-force attack.

CVE-2013-3613 dahuasecurity vulnerability CVSS: 7.8 17 Sep 2013, 12:04 UTC

Dahua DVR appliances do not properly restrict UPnP requests, which makes it easier for remote attackers to obtain access via vectors involving a replay attack against the TELNET port.

CVE-2013-3612 dahuasecurity vulnerability CVSS: 10.0 17 Sep 2013, 12:04 UTC

Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified "backdoor" account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a standalone client, or (c) unknown other vectors.