Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution

Related

Cybersecurity Leaders to Watch in Illinois Financial Services Industry

Illinois remains one of the country’s most important financial...

Cybersecurity Leaders to Watch in California’s Video Game Industry

California’s video game industry runs on always-on platforms, global...

Cybersecurity Leaders to Watch in California’s Media & Entertainment Industry

California’s media and entertainment sector depends on cybersecurity leaders...

Cybersecurity Leaders to Watch in California’s Insurance Industry

California’s insurance sector depends on cybersecurity leaders who can...

CISOs to Watch in California’s Automotive Industry

California’s automotive sector is being reshaped by electrification, connected...

Share

What happened

A high-severity vulnerability in Hikvision wireless access points can allow authenticated attackers to execute malicious commands on affected devices. The flaw, tracked as CVE-2026-0709, stems from insufficient input validation in the firmware of multiple wireless access point models manufactured by Hikvision. According to the disclosed advisory, attackers who have valid credentials can send specially crafted packets containing malicious commands to the wireless access points, which may bypass security controls and trigger arbitrary command execution. The vulnerability received a CVSS v3.1 base score of 7.2, indicating a high severity. Affected models include several in the DS-3WAP series running firmware versions V1.1.6303 build250812 and earlier. Hikvision has released patched firmware (V1.1.6601 build251223) for all impacted access point models to address the issue. 

Who is affected

Operators and administrators of affected Hikvision wireless access points with vulnerable firmware are directly affected, as the flaw allows authenticated users to execute arbitrary commands on the devices.

Why CISOs should care

Authenticated command execution vulnerabilities in wireless infrastructure can undermine network integrity and confidentiality, allowing attackers with credentials to manipulate device behavior and potentially impact broader network operations.

3 practical actions

  • Apply firmware updates. Upgrade affected Hikvision access points to the resolved firmware version (V1.1.6601 build251223).
  • Review privileged user accounts. Ensure administrative credentials for wireless infrastructure are tightly controlled and monitored.
  • Segment access point management. Restrict access to management interfaces to trusted internal networks to reduce authenticated attack opportunities.