Jan 6, 2026·6 min read·28 visits
The Edimax IC-7100 IP camera has a critical RCE vulnerability in its NTP configuration setting. By appending shell metacharacters to the `NTP_serverName` parameter, attackers can hijack the device. The vendor has abandoned the product (End-of-Life), leaving no official patch. If you have one, unplug it. It's already likely part of a botnet.
A classic, unpatched OS Command Injection vulnerability in the End-of-Life Edimax IC-7100 IP camera allows remote attackers to execute arbitrary code as root. Actively exploited by Mirai botnets since May 2024, this vulnerability demonstrates the persistent danger of 'zombie' IoT devices.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
IC-7100 IP Camera Edimax | All Versions | None (EoL) |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-78 (OS Command Injection) |
| CVSS v3.1 | 9.8 (Critical) |
| CVSS v4.0 | 9.3 (Critical) |
| Attack Vector | Network (Remote) |
| Authentication | None Required |
| EPSS Score | 0.84082 (99.27th Percentile) |
| Exploit Status | Active / Widely Exploited (Mirai) |
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.