Security Advisory –Vulnerabilities found in some Dahua products

2025-07-23

Advisory IDDHCC-SA-202507-001

First Published2025-07-23


Cybersecurity is a global challenge affecting all internet-connected devices, regardless of their origin. At Dahua, we are committed to maintaining the highest level of cybersecurity across our products and solutions, prioritising the swift resolution of any reported vulnerabilities. Dahua’s Product Security Incident Response Team (PSIRT) is dedicated to addressing security vulnerabilities promptly, notifying customers of potential risks, and sharing best practices to strengthen cybersecurity awareness.


In response to security issues reported by Bitdefender IoT Research Team, Dahua immediately conducted a comprehensive investigation of affected product models and has developed patches and firmware that fix the vulnerabilities. Please download from https://www.dahuasecurity.com/support/downloadCenter or contact Dahua local technical support to upgrade.


We strongly suggest, consistent with cybersecurity best practice, that all Dahua customers follow our security advisory, in order to ensure their systems are up-to-date and maximally protected. In the meantime, customers with other concerns on cybersecurity related issues, please feel free to contact us at psirt@dahuatech.com.


Summary

1.        CVE-2025-31700

An attacker could exploit a buffer overflow vulnerability by sending specially crafted malicious packets, potentially causing service disruption (e.g., crashes) or remote code execution (RCE). Some devices may have deployed protection mechanisms such as Address Space Layout Randomization (ASLR), which reduces the likelihood of successful RCE exploitation. However, denial-of-service (DoS) attacks remain a concern.

2.        CVE-2025-31701

An attacker could exploit a buffer overflow vulnerability by sending specially crafted malicious packets, potentially causing service disruption (e.g., crashes) or remote code execution (RCE). Some devices may have deployed protection mechanisms such as Address Space Layout Randomization (ASLR), which reduces the likelihood of successful RCE exploitation. However, denial-of-service (DoS) attacks remain a concern.


Vulnerability Score

The vulnerability classification has been performed by using the CVSSv3.1 scoring system (http://www.first.org/cvss/specification-document).


CVE-2025-31700

Base Score:8.1(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Temporal Score:7.3(E:P/RL:O/RC:C)


CVE-2025-31701

Base Score:8.1(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Temporal Score:7.3(E:P/RL:O/RC:C)


Affected Products

The following product series are currently known to be partially affected by this issue. For the specific list of affected models, please refer to: https://materialfile.dahuasecurity.com/uploads/soft/20250723/Affected-Models.pdf. Versions with a build date after April 16, 2025 are not affected by this issue.

CVE ID

Affected Models

Affected Version

CVE-2025-31700

CVE-2025-31701

IPC-1XXX Series

IPC-2XXX Series

IPC-WX Series

IPC-ECXX Series

SD3A Series

SD2A Series

SD3D Series

SDT2A Series

SD2C Series

Versions which Build time before 2025/4/16

Note: Please login to the Web interface of the device to view Build time, which you can find on the Settings-System Information-Version Information page (setting-systeminfo-version).


Fix Software Download

Please download the corresponding fix software or its newer version as listed in the above table from Dahua website, or contact Dahua local technical support to upgrade.

l  Cloud Upgrade:For products with cloud upgrade capability, the related repair version will be successively pushed through the cloud upgrade within 30 working days.

l  Dahua Official website: https://www.dahuasecurity.com/support/downloadCenter

l  Dahua Technical Support Personnel.


Support Resources

For any questions or concerns related to our products and solutions, please contact Dahua PSIRT at psirt@dahuatech.com.


Acknowledgment

We acknowledge the support of Bitdefender IoT Research Team who reported it to Dahua and coordinated with us to handle this vulnerability.


Revision History

Version

Description

Date

V1.0

Initial public release

2025-07-23