Original Article Text

Click to Toggle View

Unpatched Edimax IP camera flaw actively exploited in botnet attacks. A critical command injection vulnerability impacting the Edimax IC-7100 IP camera is currently being exploited by botnet malware to compromise devices. The flaw was discovered by Akamai researchers, who confirmed to BleepingComputer that the flaw is exploited in attacks that are still ongoing. Akamai researcher Kyle Lefton told BleepingComputer that they will provide more technical details about the flaw and the associated botnet next week. After discovering the flaw, Akamai reported it to the U.S. Cybersecurity & Infrastructure Agency (CISA), who attempted to contact the Taiwanese vendor. However, Edimax did not respond to CISA's notification attempts, and a security update for the flaw is not available. The Edimax IC-7100 is an IP security camera for remote surveillance at homes, small office buildings, commercial facilities, and industrial settings. The product isn't widely available in retail channels anymore. It was released in October 2011, and Edimax lists it under its 'legacy products,' suggesting it's no longer produced and is likely no longer supported. However, a significant number of those devices may still be used across the globe. The Edimax vulnerability is tracked as CVE-2025-1316 and is a critical severity (CVSS v4.0 score 9.3) OS command injection flaw caused by the improper neutralization of incoming requests. A remote attacker can exploit this flaw and gain remote code execution by sending specially crafted requests to the device. In this case, the current exploitation is being performed by botnet malware to compromise the devices. Botnets typically use these devices to launch distributed denial of service (DDoS) attacks, proxy malicious traffic, or pivot to other devices on the same network. Given the situation and active exploitation status for CVE-2025-1316, impacted devices should be taken offline or replaced with actively supported products. CISA recommends that users minimize internet exposure for impacted devices, place them behind firewalls, and isolate them from critical business networks. Moreover, the U.S. agency recommends using up-to-date Virtual Private Network (VPN) products for secure remote access when required. Common signs of compromised IoT devices include performance degradation, excessive heating, unexpected changes in device settings, and atypical/anomalous network traffic.

Daily Brief Summary

MALWARE // Critical Botnet Exploitation of Legacy IP Cameras Detected

A critical vulnerability in Edimax IC-7100 IP cameras is currently being exploited by a botnet.

The flaw described is a severe command injection vulnerability, identified as CVE-2025-1316, with a 9.3 CVSS score.

Akamai researchers discovered the issue and have observed ongoing malicious activities targeting these devices.

Edimax has not yet responded to multiple notifications from the U.S. Cybersecurity & Infrastructure Agency (CISA) regarding the flaw.

The IP camera model affected, released in October 2011, is now listed as a legacy product and may not receive updates or support.

Attackers exploit the vulnerability to perform activities such as launching DDoS attacks, trafficking malicious proxy traffic, and compromising other networked devices.

CISA advises users to minimize internet exposure for these devices, apply network segmentation, and use updated VPNs for secure remote access.

Indicator signs of compromise include device performance issues, overheating, changes in settings, and unusual network traffic patterns.