Another top security camera maker is seeing devices hijacked into botnet

botnet
(Image credit: Shutterstock / Jaiz Anuar)

  • A vulnerability in an old camera is being used to create a botnet
  • The camera is no longer supported by its vendor and will not receive a patch
  • Users are advised to move to a newer model

Security researchers are warning cybercriminals are abusing a command injection vulnerability in an old IP camera to build out a botnet.

The IC-7100, manufactured by a Taiwanese networking gear maker called Edimax, is vulnerable to a command injection flaw caused by the improper neutralization of incoming requests, security researchers from Akamai found.

Akamai says that a malicious group is using this flaw right now to build out a botnet - however it isn't known which botnet, or how big it is - although usually, botnets are used in DDoS attacks, illegal proxy services, ad click fraud, and more.

Obtaining confidential information

The flaw is tracked as CVE-2025-1316, and has a severity score of 9.3/10 (critical). It allows threat actors to send a custom-crafted request to the device, and thus gain remote code execution (RCE) capabilities.

The US Cybersecurity and Infrastructure Security Agency (CISA) reportedly tried reaching out to Edimax, to no avail. Akamai was somewhat luckier, being told by Edimax that the camera reached end-of-life and was no longer supported. However, the manufacturer did not say if other, newer models, were also susceptible to the same flaw, and if it would be addressing it any time soon.

The Edimax IC-7100 is a network camera designed for home and small business surveillance. It is used by homeowners, small businesses & retail stores, in offices, and by remote workers. It was released in 2011, and its discontinuation date isn't specified. Unfortunately, many owners don’t keep track of outdated gear, and continue to use hardware and software that is no longer supported, putting themselves at risk.

Unfortunately, the only way to defend against this attack is to remove the cameras and replace them with newer, supported models. Putting it behind the firewall might help mitigate the risk, but it won’t eliminate it entirely.

Via BleepingComputer

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
This worrying botnet targets unsecure TP-Link routers - thousands of devices already hacked
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Dangerous new botnet targets webcams, routers across the world
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Cisco, ASUS, QNAP, and Synology devices hijacked to major botnet
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
TP-Link and NR routers targeted by worrying new botnet
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Industrial routers are being hit by zero-days from new Mirai botnets
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Another huge new botnet is infecting thousands of webcams and video recorders for DDoS attacks
Latest in Security
DeepSeek on a mobile phone
More US government departments ban controversial AI model DeepSeek
Trojan
Microsoft warns of a devious new RAT malware which can avoid detection with apparent ease
NordProtect logo
Standalone identity theft protection from Nord Security is now available
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
Ofcom cracks down on UK tech firms, will issue sanctions for illegal content
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
These fake GitHub "security alerts" could actually let hackers hijack your account
3d rendering of a submarine power cable on the seabed
Subsea internet cables can now ‘listen’ for sabotage using irregular pulses of light
Latest in News
Lego Pokemon
Pokemon and Lego announce the most electrifying collaboration of all time and I’m going to be first in line
Apple Watch app health
Apple Watch blood pressure monitoring tech revealed in patent
Using Zipped files and folders in Windows 11
Hidden clues suggest Microsoft is moving another part of Windows 11’s Control Panel to the Settings app – and this time it’s mouse options
an image of the Samsung Galaxy S24 Ultra
Finally! One UI 7 has a release date - here are the Samsung phones that’ll get it first
Google Cloud logo
Google to acquire cloud security platform Wiz in $32 billion deal
GIMP 3.0 interface from the website
Our favorite free photo editor finally got the update it deserves - and these are the top 5 features designers should know about