CVE-2025-65817 Key Information about the Vulnerability Title: Vulnerability Report: LSC Smart Connect Camera Date: 2024-02-15 Description: Abusing the SD-card update hook to spawn remote shells on LSC Smart Connect cameras. Tags: iot, vulnerability, cve Firmware: 1.14.13 Vulnerability Details The vulnerability exploits the update system in via the SD card mount and the file. Attack Vector An attacker can place a malicious script on the SD card. This script is blindly trusted by the system and executed with root privileges during the boot process. No validation is performed on the script's contents, integrity, permissions, or ownership. Exploit Execution The malicious script is marked executable and run as root, executing with the SD card's mount point as an argument. This occurs before the main starts, giving the script access to networking utilities, watchdog functions, and upgrade helpers. Available Utilities for Exploitation The camera provides various utilities including , , , , , , , , , etc. Exploit and Proof of Concept 1. Exploit Script: 2. Verification: - Confirm that the telnet port 2323 is open using . - Connect via telnet to exploit the device. - Successful exploitation results in a root shell. Conclusion This vulnerability allows remote attackers to gain full control over LSC Smart Connect cameras by exploiting a flawed update mechanism.