Tens of thousands of Chinese surveillance cameras remain unpatched for an 11-month-old critical vulnerability, creating widespread exposure across thousands of organizations. Cybercriminals actively exploit this gap to gain unauthorized access to camera systems and are now selling that access on criminal marketplaces.
The unpatched flaw affects multiple camera models deployed globally in enterprises, government facilities, and critical infrastructure. Organizations running these systems without current patches face direct risk of compromise. Attackers gain initial access through the vulnerability, then monetize that foothold by reselling credentials and system access to other threat actors.
The 11-month window between vulnerability disclosure and active criminal exploitation demonstrates the real-world cost of delayed patching. Defenders operating affected camera infrastructure must prioritize immediate patching. Organizations should conduct network inventory to identify vulnerable camera models, isolate them on segmented networks, and apply available patches without delay. Network access controls should restrict camera management interfaces to authorized personnel only.
The criminal marketplace activity indicates active, ongoing exploitation rather than theoretical risk. This raises the threat level from potential to immediate for any organization running unpatched units.
