TVT DVR becomes a main objective for Mirai Botnet


  • Greynoise says that the scanning for vulnerable TVT DVRs are increasing
  • More than 2,500 unique IP addresses were hunting at one point
  • A vulnerability of 2024 allows the threat actors to execute administration commands on the device

The Mirai Botnet operators are actively looking for vulnerable TVT DVRs to assimilate them to the disastrous network, cybersecurity researchers Graynoise have revealed after observing a peak in exploitation attempts.

In May 2024, SSD’s safe dissemination safety researchers reported a vulnerability that affected the DVR NVMS9000 built by the TVT digital technology manufacturer based in Shenzhen. Vulnerability was described as an authentication bypass, allowing threat actors to execute administration commands on the device incessantly.

Leave a Comment

Your email address will not be published. Required fields are marked *