Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution

Related

Apache Syncope Vulnerability Lets Attackers Hijack User Sessions

What happened A critical XML External Entity (XXE) vulnerability in...

Malicious App on Google Play With 50K+ Downloads Steals Credentials and Pushes Ads

What happened Zscaler ThreatLabz identified a malicious Android app hosted...

Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution

What happened A high-severity vulnerability in Hikvision wireless access points...

OpenClaw AI Agent Skills Abused to Conduct Credential Stuffing and Profile Hijacking

What happened Security researchers at VirusTotal have identified malicious use...

Share

What happened

A high-severity vulnerability in Hikvision wireless access points can allow authenticated attackers to execute malicious commands on affected devices. The flaw, tracked as CVE-2026-0709, stems from insufficient input validation in the firmware of multiple wireless access point models manufactured by Hikvision. According to the disclosed advisory, attackers who have valid credentials can send specially crafted packets containing malicious commands to the wireless access points, which may bypass security controls and trigger arbitrary command execution. The vulnerability received a CVSS v3.1 base score of 7.2, indicating a high severity. Affected models include several in the DS-3WAP series running firmware versions V1.1.6303 build250812 and earlier. Hikvision has released patched firmware (V1.1.6601 build251223) for all impacted access point models to address the issue. 

Who is affected

Operators and administrators of affected Hikvision wireless access points with vulnerable firmware are directly affected, as the flaw allows authenticated users to execute arbitrary commands on the devices.

Why CISOs should care

Authenticated command execution vulnerabilities in wireless infrastructure can undermine network integrity and confidentiality, allowing attackers with credentials to manipulate device behavior and potentially impact broader network operations.

3 practical actions

  • Apply firmware updates. Upgrade affected Hikvision access points to the resolved firmware version (V1.1.6601 build251223).
  • Review privileged user accounts. Ensure administrative credentials for wireless infrastructure are tightly controlled and monitored.
  • Segment access point management. Restrict access to management interfaces to trusted internal networks to reduce authenticated attack opportunities.