Tech »  Topic »  Critical HIKVISION applyCT Flaw Allows Remote Code Execution

Critical HIKVISION applyCT Flaw Allows Remote Code Execution


A newly disclosed vulnerability, tracked as CVE-2025-34067, has been identified in HIKVISION’s widely deployed security management platform, applyCT (also known as HikCentral).

This critical flaw allows unauthenticated remote code execution (RCE), putting countless surveillance and security infrastructures at risk across government, commercial, and industrial sectors.

Its advanced analytics and scalable architecture make it a popular choice for organizations requiring robust surveillance and security management.

The platform’s widespread adoption means that vulnerabilities can have far-reaching consequences.

Field Value
CVE ID CVE-2025-34067
Published 2025-07-02
Endpoint /bic/ssoService/v1/applyCT
CVSS Score 10.0 (Critical)

Technical Details

  • Component Affected: applyCT (HikCentral)
  • Vulnerability Type: Unauthenticated Remote Code Execution
  • Root Cause: Use of a vulnerable version of the Fastjson library
  • Attack Vector: Network (no authentication required)
  • Endpoint: /bic/ssoService/v1/applyCT
  • Exploit Mechanism: The endpoint deserializes untrusted JSON input using Fastjson’s auto-type feature, allowing attackers to load arbitrary Java classes via a ...

Copyright of this story solely belongs to gbhackers . To see the full text click HERE