Let’s just say it: if you’re still running old surveillance boxes like the Digiever DS-2105 Pro NVR, you’ve painted a target on your network. CISA’s shout-out about the actively exploited CVE-2023-52163 vulnerability isn’t a one-off. It’s business as usual for the Internet of Unfixed Things. And the only people genuinely surprised are those who haven’t been paying attention.
CVE-2023-52163: The Gaping Hole No One Bothered to Patch
Here’s the punchline: Digiever’s DS-2105 Pro NVRs—network video recorders that should be keeping your business secure—come with a glaring command injection vulnerability. The kind of bug that, once you’re logged in, lets you inject any command you like. Blame the missing authorization check at the time_tzsetup.cgi endpoint. If that sounds bad, it is. This isn’t some obscure, theoretical flaw: it scores 8.8 on the CVSS. In infosec bingo, that’s almost a full house.
Now, exploitation requires a login. “Oh, but I have a password,” you say? That’s nice. Except, as usual, companies slap these boxes onto networks with default or embarrassingly weak credentials. So the front door’s wide open—again.
Hackers Don’t Need an Invitation—They’re Already Inside
If you’re wondering whether this is all just doom-mongering, think again. Security firms like Akamai and Fortinet have seen this bug being hit in the wild. Right now. Attackers are already wrangling these NVRs into botnets—Mirai and ShadowV2 are just the start. Once your box gets popped, it isn’t just another compromised camera feed. It’s a launchpad. DDoS proxy. Malware drop zone. Beachhead for breaking into your wider network.
This mess is multiplied by a second, equally ugly flaw—CVE-2023-52164. This one spills files to anyone who asks. Between these two weaknesses, your precious security box is about as useful as a chocolate fireguard.
No Patch, No Hope: The End-of-Life Excuse
Why aren't fixes rolling out from Digiever? Simple—they’ve washed their hands of the DS-2105 Pro. End of life means end of responsibility, apparently. That leaves you with all the risk and none of the support. Hope you like living dangerously.
Plenty of organizations, desperate to squeeze the last cent from this outdated kit, keep those NVRs running long past their sell-by date. As support ends, so does your safety net. Hackers know it. You know it (or you certainly should).
The Quick Fixes That No One Ever Bothers To Do
You don’t want your NVR as botnet fodder, so what can you actually do? Here’s what CISA, threat researchers, and anyone with common sense recommend:
- Network Segmentation: Put these old surveillance boxes on an island. Don’t let them chat with your critical servers or sensitive data.
- Lose the Default Passwords: The phrase "change your password" is as old as the hills, but here we are. Actually do it. Make it strong. Make it unique.
- Remove Internet Exposure: Why is the admin interface even web-facing? Pull it off the internet. Now.
- Watch Your Outbound Traffic: Set up monitoring. If one of these boxes starts making strange outbound connections, you’ll want to know fast.
- Replace the Device: There’s no magic patch. It’s time to buy new kit that still gets security updates.
- Virtual Patching: If you’re really stuck with this fossil, put in some intrusion prevention, at least. Block attacks at the network level and keep this hole from being an express lane into your infrastructure.
- Regular Security Audits: Don’t just worry about Windows boxes. Audit the dumb boxes, too—like NVRs and door controls.
- Staff Training: Teach your users that legacy devices aren’t just boring—they’re risky as hell.
- Talk to Your Vendors: Kick your suppliers until they give you proper security guidance or at least a roadmap for retirement.
But let's be honest: most companies won't bother until something breaks or ransomware shows up with a seven-figure invoice.
The Bigger Picture: IoT Is Still a Dumpster Fire
This Digiever mess isn’t unique. It’s the next logical chapter in a sad, endless series. From printers to baby monitors to public cameras, too many IoT devices out there are basically unmaintained, unprotected computers. Security patches stop coming, but companies keep plugging them into their networks and hoping for the best. Criminals love it. Why invent new exploits when the old ones still work?
The harsh truth? You can buy shiny new hardware, design clever segmentation, and run audits until you’re blue in the face. But if you don’t stay on top of your inventory—removing unsupported boxes, updating credentials, and keeping exposure to a minimum—you’re gambling with your business. All it takes is one neglected NVR to turn the lights out across your entire operation.
So maybe, when the next compliance questionnaire arrives or audit season looms, think about your creaking surveillance stack. The attackers certainly are. And they’re not tired of the same old tricks—because, depressingly, neither are we.


