Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Warns: Hackers Use AI to Create Zero- Using Working
May 11, 2026
Go Library fsnotify: Supply Chain Alarms After Access Changes
May 11, 2026
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Home/CyberSecurity News/Hikvision Wireless AP Vulnerability Allows Command Execution
CyberSecurity News

Hikvision Wireless AP Vulnerability Allows Command Execution

A critical authenticated command execution vulnerability has been disclosed, affecting multiple Hikvision Wireless Access Point (WAP) models. The flaw, tracked as CVE-2026-0709, stems from...

David kimber
David kimber
February 3, 2026 2 Min Read
3 0

A critical authenticated command execution vulnerability has been disclosed, affecting multiple Hikvision Wireless Access Point (WAP) models.

The flaw, tracked as CVE-2026-0709, stems from insufficient input validation in device firmware, potentially allowing attackers with valid credentials to execute arbitrary commands on affected systems.

The vulnerability carries a CVSS v3.1 base score of 7.2, indicating a high-severity threat.

According to the advisory, attackers who can authenticate to the device can send specially crafted packets containing malicious commands directly to the WAP, bypassing critical security controls.

This attack vector bypasses network perimeter defenses since it requires valid credentials, making it particularly dangerous in environments where user authentication has been compromised or where insider threats exist.

Affected Models and Timeline

Affected Model Vulnerable Firmware Version
DS-3WAP521-SI V1.1.6303 build250812 and earlier
DS-3WAP522-SI V1.1.6303 build250812 and earlier
DS-3WAP621E-SI V1.1.6303 build250812 and earlier
DS-3WAP622E-SI V1.1.6303 build250812 and earlier
DS-3WAP623E-SI V1.1.6303 build250812 and earlier
DS-3WAP622G-SI V1.1.6303 build250812 and earlier

Hikvision has released patched firmware versions (V1.1.6601 build 251223) that address the flaw across all affected devices.

The vulnerability was initially reported on January 30, 2026, by an independent security researcher, exzettabyte.

Organizations deploying these WAP models should immediately prioritize updating to the resolved firmware version to mitigate exploitation risks.

Vulnerability Details and Impact

The authenticated nature of this vulnerability makes it particularly concerning for enterprise environments.

While attackers must possess valid device credentials, compromised user accounts, stolen credentials, or insider threats can serve as entry points.

Once authenticated, the insufficient input validation allows threat actors to inject and execute arbitrary commands with device privileges, potentially leading to complete system compromise.

Organizations operating affected Hikvision WAP models should take immediate action. Patches are available for download on the official Hikvision support portal.

Administrators should deploy firmware version V1.1.6601 build 251223 across all vulnerable devices in their infrastructure.

Simultaneously, organizations should review access controls and enforce strong authentication mechanisms to limit device access to authorized personnel only.

For organizations unable to patch immediately, implementing network segmentation to restrict device access and monitoring authentication logs for suspicious activity can provide interim protection.

Additionally, credential rotation for affected devices is recommended to prevent exploitation through compromised accounts. Hikvision’s HSRC continues monitoring security threats and welcomes vulnerability disclosures at [email protected].

Organizations with questions regarding this vulnerability should contact Hikvision support through official channels.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Malicious Google Play App with 50K+ Downloads Deploy Anatsa

Next Post

APT28 Exploits Microsoft Office 0-Day Hackers Exploiting

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
ShinyHunters Breaches Instructure Canvas LMS Free-
May 11, 2026
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us