Milesight Cameras
Multiple vulnerabilities in Milesight IP cameras allow remote attackers to crash the device or execute arbitrary code. The vulnerabilities stem from improper input validation (CWE-122), use of hardcoded credentials (CWE-798), insufficient cryptographic controls (CWE-321), command injection (CWE-78), and improper restriction of rendered UI layers (CWE-639). Affected products span PE, PC, PA, PD, and G1 series cameras, as well as thermal and network-attached models. Successful exploitation requires only network access and no authentication.
- Network reachability to the camera's management interface (typically HTTP/HTTPS port 80 or 443)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e64a2863-eafa-4da6-aa0b-d5367535c33dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.