Xiongmai XM530 IP Camera ONVIF Complete Authentication Bypass
Complete authentication bypass in the ONVIF implementation of Xiongmai XM530-series IP cameras allows unauthenticated remote access to sensitive device information, configuration, and video streams.
CVE ID: CVE-2025-65856
Severity: CRITICAL
CVSS v3.1 Score: 9.8 (Researcher assessment - pending NVD analysis)
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Official CVSS score will be published by NVD following their analysis.
Vendor: Hangzhou Xiongmai Technology Co., Ltd.
Product: IP Camera XM530V200_X6-WEQ_8M
Commercial Brand: ANBIUX (and hundreds of OEM rebrands)
Firmware: V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06 and likely all V5.00.R02.* versions
Component: ONVIF Web Service Implementation
Device Context:
Xiongmai is a major OEM supplier of IP cameras sold under hundreds of brand names globally. These cameras are widely deployed in residential, commercial, and industrial surveillance systems.
The ONVIF web service implementation fails to enforce authentication on 31 critical endpoints that should require credentials per ONVIF specifications.
Technical Details:
GetDeviceInformation - Hardware/firmware detailsGetUsers - User account informationGetStreamUri - RTSP stream URIs with credentialsGetSnapshotUri - Still image URIsGetNetworkInterfaces - Network configurationGetNetworkProtocols - Enabled services/portsGetDNS / GetNTP - DNS and NTP configurationGetPresets / GetNodes - PTZ configurationSetRelayOutputState - Control relay outputs (alarms)port:80 "Server: uc-httpd" or port:8899 "XM")An unauthenticated remote attacker can:
Privacy Impact: Direct violation of GDPR and privacy regulations. Enables mass surveillance operations.
Combined with CVE-2025-65857: Complete zero-authentication access to live video streams.
Basic ONVIF Request (No Authentication):
curl -X POST http://[CAMERA_IP]:8899/onvif/device_service \
-H "Content-Type: application/soap+xml" \
-d '<?xml version="1.0" encoding="UTF-8"?>
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope">
<s:Body xmlns:tds="http://www.onvif.org/ver10/device/wsdl">
<tds:GetDeviceInformation/>
</s:Body>
</s:Envelope>'
Expected: Authentication required
Actual: Full device information returned without credentials
Complete PoC testing all 31 vulnerable endpoints available to security researchers upon request.
No patch currently available.
Vendor Response: No response received. Official security contact infrastructure non-functional.
Discovered by: Luis Miranda Acebedo
Location: Vigo, Galicia, Spain
Contact: luis.miranda.acebedo@gmail.com
This site is open source. Improve this page.