The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw affecting Digiever DS-2105 Pro network video recorders (NVRs) to its Known Exploited Vulnerabilities (KEV) Catalog, based on confirmed evidence that threat actors are actively exploiting the issue in the wild. The vulnerability could allow an authenticated attacker to execute arbitrary commands on vulnerable devices, potentially enabling compromise of video surveillance infrastructure and broader network environments. The development underscores a continuing trend of cybercriminals leveraging weaknesses in Internet of Things (IoT) and network-connected devices — especially those past their support lifespan — to gain footholds, deploy malware, and expand persistence within enterprise and critical infrastructure environments. Below is an in-depth, SEO-optimized, plagiarism-free news article exploring the vulnerability, how it’s exploited, its wider implications, and how organizations can protect themselves. What Is the Digiever NVR Vulnerability? The vulnerability CVE-2023-52163 impacts the Digiever DS-2105 Pro series of network video recorders. It stems from a missing authorization weakness in the device’s web-based management interface — specifically in the time_tzsetup.cgi component — that enables command injection. Technical Summary CVE ID: CVE-2023-52163 Type: Command injection due to missing authorization (CWE-862) Affected Product: Digiever DS-2105 Pro NVR devices Severity: High (CVSS score: 8.8/10) Impact: Post-authentication remote code execution (RCE) Exploit Status: Actively exploited in the wild (confirmed by CISA) The command injection occurs because the NVR’s CGI endpoint fails to enforce proper authorization checks before processing user input. An attacker who already holds valid credentials — typically obtained through weak passwords, default accounts, credential theft, or other means — can inject malicious commands that the system will execute on the underlying operating system with elevated privileges. Crucially, this vulnerability has no official vendor patch, because the affected device series has reached end-of-life (EoL) and is no longer actively supported by the manufacturer. What “Actively Exploited” Means When CISA lists a vulnerability in the Known Exploited Vulnerabilities Catalog, it signals that cybersecurity researchers or incident responders have observed actual exploitation activity, not just theoretical or proof-of-concept misuse. This makes the vulnerability urgent, rather than merely a candidate for future exploitation. In this case, multiple security vendors — including Akamai, Fortinet, and TXOne Research — have linked evidence of ongoing exploitation of CVE-2023-52163 to the delivery of botnet malware, particularly variants of the infamous Mirai family, such as ShadowV2 and others. Botnets like these can transform vulnerable IoT devices into distributed nodes used for large-scale attacks such as distributed denial-of-service (DDoS), credential harvesting, information stealing, or automated lateral movement within a compromised environment. Why This Vulnerability Matters 1. Remote Code Execution on Surveillance Infrastructure Network video recorders are often deployed as part of physical security systems in offices, factories, warehouses, campuses, hospitals, and government facilities. Compromise of such devices could: Disrupt surveillance and incident response Alter or delete forensic video logs Provide attackers with a concealed foothold into internal networks Compromised NVRs could also be used as pivot points to move deeper into enterprise systems, especially if they reside on network segments with broader access privileges. 2. High Severity, Limited Vendor Support With a CVSS score of 8.8, this is a high-impact vulnerability. Yet, the end-of-life status of many affected Digiever units means there is no official patch, increasing the risk for organizations still operating this equipment. EoL devices frequently lack not only security patches but also newer authentication hardening, encryption enhancements, and security monitoring features available in current product lines. This creates extended windows of exposure. 3. Botnet Propagation and IoT Risk The exploitation of this vulnerability to deploy Mirai-like malware — historically one of the most disruptive botnets — reinforces a broader trend in cybersecurity: legacy IoT devices remain prime targets due to weak security models and long unpatched lifespans. Botnets can co-opt large numbers of devices for coordinated attacks or to support illicit infrastructure, making the impact not just localized but potentially globally disruptive. How the Exploit Works To successfully exploit CVE-2023-52163, attackers must first authenticate to the web management console of a Digiever DS-2105 Pro device. This means they typically gain access through: Default or weak administrative credentials Credential stuffing attacks leveraging leaked login databases Brute-force login attempts against exposed interfaces Once authenticated, attackers send crafted HTTP requests to the time_tzsetup.cgi script with malicious payloads that trigger command injection. The NVR system accepts and executes these commands without proper authorization barriers, giving the attacker execution privileges on the host operating system. From there, they can install botnet code, create persistence mechanisms, or modify system behavior. Command injection vulnerabilities like this essentially reduce a compromised device to an attacker’s remote shell trigger. Real-World Evidence of Exploitation Security firm Akamai has reported its threat intelligence teams observing exploitation attempts leveraging this vulnerability to spread Mirai and ShadowV2 botnet families. These botnets are known to leverage large numbers of connected devices for coordinated malicious operations. Fortinet has similarly noted active scanning and exploitation activity targeting devices with exposed management interfaces, reinforcing the need for immediate defensive measures. Mitigations and Defensive Actions Because Digiever DS-2105 Pro devices no longer receive security updates, organizations must focus on compensating controls and network protections to mitigate exploitation risk. ▪ Isolate Vulnerable Devices Move all affected NVRs into segmented network zones that do not connect directly to critical systems. Limit traffic between surveillance networks and enterprise internal networks. Avoid exposing management interfaces to the public internet. ▪ Strengthen Access Controls Change default usernames and passwords immediately. Enforce complex, unique credentials that are resistant to brute-force or credential stuffing. Where possible, integrate device access into centralized authentication platforms that provide stronger controls. ▪ Monitor Network Activity Implement intrusion detection/prevention systems (IDS/IPS) to flag unusual HTTP/CGI invocation patterns. Watch for anomalous command execution or lateral traffic originating from NVR subnet segments. Log and review authentication attempts for signs of brute-force or external access. ▪ Replace End-of-Life Equipment If practical, decommission unsupported NVRs and replace them with modern, actively supported models with ongoing security patching and stronger built-in defenses. CISA’s Directive and Deadlines CISA’s inclusion of CVE-2023-52163 in the Known Exploited Vulnerabilities Catalog carries operational significance. Federal Civilian Executive Branch (FCEB) agencies are generally expected to remediate the vulnerabilities or implement mitigations by the specified deadline — in this case, January 12, 2026 — as part of compliance with Binding Operational Directive requirements. Even for non-federal organizations, these alerts serve as strong warnings that real threat actors are targeting these specific vulnerabilities. Broader Takeaways for IoT Security The Digiever vulnerability highlights several pressing lessons for modern cybersecurity: Legacy Systems Create Long-Term Risk IoT and embedded devices often remain in service far past their manufacturer support windows — creating persistent security gaps that attackers exploit. Authentication Is Not Enough Even if authentication is required, backend authorization controls must be robust — missing authorization bugs like this one still allow privilege abuse after login. Network Context Matters Segmentation and traffic controls are often the last line of defense for systems that cannot be patched directly. Final Thoughts CISA’s alert on the Digiever DS-2105 Pro vulnerability and its active exploitation by malware authors is a stark reminder of how production-grade security systems themselves can become gateways for attackers when vulnerabilities persist unpatched. Organizations must take these alerts seriously — moving quickly to isolate affected hardware, strengthen access controls, and update network defenses. The combination of remote code execution risk, active exploitation evidence, and lack of vendor updates means this issue should be treated as a top-tier security priority for any environment running the affected devices. Post navigation Fortinet Warns of Active Exploitation of Critical Vulnerabilities in FortiOS and Fortinet Products