vivotek CVE Vulnerabilities & Metrics

Focus on vivotek vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About vivotek Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with vivotek. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total vivotek CVEs: 28
Earliest CVE date: 11 Jun 2007, 22:30 UTC
Latest CVE date: 03 Aug 2024, 19:15 UTC

Latest CVE reference: CVE-2024-7443

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 5

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical vivotek CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 7.19

Max CVSS: 10.0

Critical CVEs (≥9): 11

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 13
7.0-8.9 6
9.0-10.0 11

CVSS Distribution Chart

Top 5 Highest CVSS vivotek CVEs

These are the five CVEs with the highest CVSS scores for vivotek, sorted by severity first and recency.

All CVEs for vivotek

CVE-2024-7443 vivotek vulnerability CVSS: 6.5 03 Aug 2024, 19:15 UTC

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in Vivotek IB8367A VVTK-0100b. Affected is the function getenv of the file upload_file.cgi. The manipulation of the argument QUERY_STRING leads to command injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-273528. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the affected release tree is end-of-life.

CVE-2024-7442 vivotek vulnerability CVSS: 6.5 03 Aug 2024, 18:15 UTC

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Vivotek SD9364 VVTK-0103f. It has been rated as critical. This issue affects the function getenv of the file upload_file.cgi. The manipulation of the argument QUERY_STRING leads to command injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-273527. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the affected release tree is end-of-life.

CVE-2024-7441 vivotek vulnerability CVSS: 9.0 03 Aug 2024, 18:15 UTC

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Vivotek SD9364 VVTK-0103f. It has been declared as critical. This vulnerability affects the function read of the component httpd. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273526 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the affected release tree is end-of-life.

CVE-2024-7440 vivotek vulnerability CVSS: 6.5 03 Aug 2024, 17:15 UTC

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Vivotek CC8160 VVTK-0100d. It has been classified as critical. This affects the function getenv of the file upload_file.cgi. The manipulation of the argument QUERY_STRING leads to command injection. It is possible to initiate the attack remotely. The identifier VDB-273525 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the affected release tree is end-of-life.

CVE-2024-7439 vivotek vulnerability CVSS: 9.0 03 Aug 2024, 16:15 UTC

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Vivotek CC8160 VVTK-0100d and classified as critical. Affected by this issue is the function read of the component httpd. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273524. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the affected release tree is end-of-life.

CVE-2020-11950 vivotek vulnerability CVSS: 9.0 28 May 2020, 13:15 UTC

VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to upload and execute a script (with resultant execution of OS commands). For example, this affects IT9388-HT devices.

CVE-2020-11949 vivotek vulnerability CVSS: 4.0 28 May 2020, 13:15 UTC

testserver.cgi of the web service on VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to obtain arbitrary files from a camera's local filesystem. For example, this affects IT9388-HT devices.

CVE-2013-1598 vivotek vulnerability CVSS: 9.0 24 Jan 2020, 19:15 UTC

A Command Injection vulnerability exists in Vivotek PT7135 IP Cameras 0300a and 0400a via the system.ntp parameter to the farseer.out binary file, which cold let a malicious user execute arbitrary code.

CVE-2013-1597 vivotek vulnerability CVSS: 4.0 24 Jan 2020, 19:15 UTC

A Directory Traversal vulnerability exists in Vivotek PT7135 IP Cameras 0300a and 0400a via a specially crafted GET request, which could let a malicious user obtain user credentials.

CVE-2013-1596 vivotek vulnerability CVSS: 5.0 24 Jan 2020, 18:15 UTC

An Authentication Bypass Vulnerability exists in Vivotek PT7135 IP Camera 0300a and 0400a via specially crafted RTSP packets to TCP port 554.

CVE-2013-1595 vivotek vulnerability CVSS: 7.5 24 Jan 2020, 18:15 UTC

A Buffer Overflow vulnerability exists in Vivotek PT7135 IP Camera 0300a and 0400a via a specially crafted packet in the Authorization header field sent to the RTSP service, which could let a remote malicious user execute arbitrary code or cause a Denial of Service.

CVE-2013-1594 vivotek vulnerability CVSS: 5.0 24 Jan 2020, 17:15 UTC

An Information Disclosure vulnerability exists via a GET request in Vivotek PT7135 IP Camera 0300a and 0400a due to wireless keys and 3rd party credentials stored in clear text.

CVE-2013-4985 vivotek vulnerability CVSS: 5.0 27 Dec 2019, 17:15 UTC

Multiple Vivotek IP Cameras remote authentication bypass that could allow access to the video stream

CVE-2019-14458 vivotek vulnerability CVSS: 7.8 18 Sep 2019, 18:15 UTC

VIVOTEK IP Camera devices with firmware before 0x20x allow a denial of service via a crafted HTTP header.

CVE-2019-10256 vivotek vulnerability CVSS: 7.5 10 Sep 2019, 19:15 UTC

An authentication bypass vulnerability in VIVOTEK IPCam versions prior to 0x13a was found.

CVE-2019-14457 vivotek vulnerability CVSS: 7.5 10 Sep 2019, 18:15 UTC

VIVOTEK IP Camera devices with firmware before 0x20x have a stack-based buffer overflow via a crafted HTTP header.

CVE-2018-14496 vivotek vulnerability CVSS: 7.5 10 Jul 2019, 14:15 UTC

Vivotek FD8136 devices allow remote memory corruption and remote code execution because of a stack-based buffer overflow, related to sprintf, vlocal_buff_4326, and set_getparam.cgi. NOTE: The vendor has disputed this as a vulnerability and states that the issue does not cause a web server crash or have any other affect on it's performance

CVE-2018-14495 vivotek vulnerability CVSS: 10.0 10 Jul 2019, 14:15 UTC

Vivotek FD8136 devices allow Remote Command Injection, aka "another command injection vulnerability in our target device," a different issue than CVE-2018-14494. NOTE: The vendor has disputed this as a vulnerability and states that the issue does not cause a web server crash or have any other affect on it's performance

CVE-2018-14494 vivotek vulnerability CVSS: 10.0 10 Jul 2019, 13:15 UTC

Vivotek FD8136 devices allow Remote Command Injection, related to BusyBox and wget. NOTE: the vendor sent a clarification on 2019-09-17 explaining that, although this CVE was first populated in July 2019, it is a historical vulnerability that does not apply to any current or recent Vivotek hardware or firmware

CVE-2018-18244 vivotek vulnerability CVSS: 4.3 03 Jan 2019, 20:29 UTC

Cross-site scripting in syslog.html in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript code via an HTTP Referer Header.

CVE-2018-18005 vivotek vulnerability CVSS: 4.3 03 Jan 2019, 20:29 UTC

Cross-site scripting in event_script.js in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript via a URL query string parameter.

CVE-2018-18004 vivotek vulnerability CVSS: 5.0 03 Jan 2019, 20:29 UTC

Incorrect Access Control in mod_inetd.cgi in VIVOTEK Network Camera Series products with firmware before XXXXXX-VVTK-0X09a allows remote attackers to enable arbitrary system services via a URL parameter.

CVE-2018-14771 vivotek vulnerability CVSS: 9.0 05 Sep 2018, 21:29 UTC

VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code (issue 2 of 2) via eventscript.cgi.

CVE-2018-14770 vivotek vulnerability CVSS: 9.0 05 Sep 2018, 21:29 UTC

VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code (issue 1 of 2) via the ONVIF interface, (/onvif/device_service).

CVE-2018-14769 vivotek vulnerability CVSS: 6.8 05 Sep 2018, 21:29 UTC

VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow CSRF.

CVE-2018-14768 vivotek vulnerability CVSS: 9.0 29 Aug 2018, 19:29 UTC

Various VIVOTEK FD8*, FD9*, FE9*, IB8*, IB9*, IP9*, IZ9*, MS9*, SD9*, and other devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code.

CVE-2017-9829 vivotek vulnerability CVSS: 5.0 23 Jun 2017, 22:29 UTC

'/cgi-bin/admin/downloadMedias.cgi' of the web service in most of the VIVOTEK Network Cameras is vulnerable, which allows remote attackers to read any file on the camera's Linux filesystem via a crafted HTTP request containing ".." sequences. This vulnerability is already verified on VIVOTEK Network Camera IB8369/FD8164/FD816BA; most others have similar firmware that may be affected.

CVE-2017-9828 vivotek vulnerability CVSS: 10.0 23 Jun 2017, 22:29 UTC

'/cgi-bin/admin/testserver.cgi' of the web service in most of the VIVOTEK Network Cameras is vulnerable to shell command injection, which allows remote attackers to execute any shell command as root via a crafted HTTP request. This vulnerability is already verified on VIVOTEK Network Camera IB8369/FD8164/FD816BA; most others have similar firmware that may be affected. An attack uses shell metacharacters in the senderemail parameter.

CVE-2008-4771 vivotek vulnerability CVSS: 9.3 28 Oct 2008, 19:20 UTC

Stack-based buffer overflow in VATDecoder.VatCtrl.1 ActiveX control in (1) 4xem VatCtrl Class (VATDecoder.dll 1.0.0.27 and 1.0.0.51), (2) D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5), (3) Vivotek RTSP MPEG4 SP Control (RtspVapgDecoderNew.dll 2.0.0.39), and possibly other products, allows remote attackers to execute arbitrary code via a long Url property. NOTE: some of these details are obtained from third party information.

CVE-2007-3167 vivotek vulnerability CVSS: 7.6 11 Jun 2007, 22:30 UTC

Stack-based buffer overflow in the Vivotek Motion Jpeg ActiveX control (aka MjpegControl) in MjpegDecoder.dll 2.0.0.13 allows remote attackers to execute arbitrary code via a long PtzUrl property value.