You are visiting the Akuvox Global site.

Click here to visit Akuvox's Australian website.

  • Home
  • >
  • Vulnerabilities Identified in Certain Smart Intercom Products

Vulnerabilities Identified in Certain Smart Intercom Products

1. Vulnerability Overview

Akuvox has identified two security vulnerabilities (CVE-2024-58336 and CVE-2024-58337) affecting certain smart intercom products. Attackers may exploit these vulnerabilities to obtain live video streams without authentication, or escalate privileges to gain access to device management features.


  • CVE-2024-58336:

    Unauthorized Video Stream Disclosure. Due to insufficient validation on the video request interface over certain ports (e.g., port 8080), a remote attacker can obtain the live camera feed by sending specially crafted requests without any authentication.
  • CVE-2024-58337:

    Improper Access Control. Attackers with basic "User" privileges can modify API access settings and system configurations, gaining elevated privileges and administrative control.

2. Affected Products

The following product models and firmware versions are impacted. Users are strongly advised to take immediate security measures.

No. Product Name Affected Version Fix Released On Recommended Version / Mitigation
1 S539 Versions prior to 539.30.10.216 2024-10-08 Upgrade to 539.30.10.216 or later
2 S532 Versions prior to 532.30.10.243 2025-03-12 Upgrade to 532.30.10.243 or later
3 X916 Versions prior to 916.30.10.210 2024-10-12 Upgrade to 916.30.10.210 or later
4 X915 Versions prior to 915.30.10.158 2024-09-30 Upgrade to 915.30.10.158 or later
5 X915v2 Versions prior to 2915.30.10.214 2024-10-09 Upgrade to 2915.30.10.214 or later
6 X912 Versions prior to 912.30.11.65 2025-04-03 Upgrade to 912.30.11.65 or later
7 R20K-2 Versions prior to 320.30.10.240 2024-12-26 Upgrade to 320.30.10.240 or later
8 R20A-2 Versions prior to 320.30.10.240 2024-12-26 Upgrade to 320.30.10.240 or later
9 E18 Versions prior to 18.30.10.247 2025-10-20 Upgrade to 18.30.10.247 or later
10 R25 Versions prior to 25.30.10.5 2024-09-11 Upgrade to 25.30.10.5 or later

3. Mitigation and Recommendations

To reduce security risks, Akuvox recommends the following measures:

  • Firmware Upgrade:

    Immediately check all affected devices and contact our technical support at techsupport@akuvox.com for the upgrade. Upgrade to the latest fixed firmware.
  • Network Isolation:

    Before applying the firmware update, deploy affected intercom devices in a protected, isolated VLAN. Do not expose them to the public internet and restrict cross-segment access to nonessential ports such as 8080.
  • Account Security:

    Review current user permissions, disable unnecessary "User" accounts, and enforce strong password policies.

4. Vulnerability Source

These vulnerabilities were discovered and reported by the external security research team LiquidWorm (Gjoko Krstic) of Zero Science Lab. Akuvox extends appreciation to researchers who contribute to improving product security.


5. Contact Information

If you identify potential security risks or require technical assistance, please contact us via:

Akuvox reserves the final right to modify and interpret this advisory.

<%=cnzz%>