Merit LILIN IP cameras hit by OS command‑injection (CVE‑2026‑0855) — when your CCTV becomes the easiest backdoor into the network

Merit LILIN IP cameras hit by OS command‑injection (CVE‑2026‑0855) — when your CCTV becomes the easiest backdoor into the network

A high‑severity OS command‑injection vulnerability has been disclosed in certain Merit LILIN IP camera models (CVE‑2026‑0855). The flaw allows an authenticated remote attacker to inject arbitrary operating‑system commands and execute them on the device, creating a real risk that physical security cameras could be turned into a launchpad for wider network compromise.

Severity is rated at 8.8 (HIGH). The affected items are specific camera models produced by Merit LILIN; the advisory notes that the attacker must be authenticated to the device to exploit the bug. Beyond that, the technical details and any vendor mitigation notes in the advisory should be read directly by technical teams — do not rely on hearsay.

Why this matters to your business

These are not niche toys tucked away in a lab — IP cameras sit at the intersection of physical security and IT. If an attacker can run shell commands on a camera, they can potentially:

  • move laterally from the camera into the corporate network, stealing data or disrupting systems;
  • delete or tamper with footage (lost evidence, regulatory headaches and insurance surprises);
  • Create persistent footholds that survive obvious remediation steps such as password changes;
  • abuse camera resources for other attacks, or simply take them offline and blind security teams.

For organisations subject to data protection law, compromised cameras also raise privacy and GDPR risks if footage of identifiable persons is accessed or exfiltrated. For operators and MSPs running large estates of edge devices, a single firmware‑level flaw on many units can quickly become a major incident.

How this usually goes wrong (and what keeps CISOs awake)

From experience, incidents like this follow a predictable pattern: devices were deployed years ago, never fully inventoried, patched rarely (if ever), and have management interfaces reachable from networks they shouldn’t be on. Default credentials, shared passwords and flat network zones make exploitation easy. Meanwhile, operational teams treat cameras as “just security” and not part of the information security perimeter — until they are.

Ignore that and you get the classic domino: compromised camera → lateral movement → stolen credentials → business‑critical outages, regulatory scrutiny, lost contracts and, worst of all, months of expensive remediation. Fixing that is much more costly than buying decent kit in the first place.

Immediate actions you can take (this afternoon)

Containment and quick wins

  • Isolate affected devices: place cameras on a dedicated VLAN or network segment and block management interfaces from general user networks and the internet.
  • Change credentials: ensure each device has a unique, strong management password; remove or disable any factory defaults.
  • Restrict admin access: limit administrative access to a small set of IP addresses or via jump boxes and require secure authentication.
  • Check vendor guidance: consult Merit LILIN advisories and firmware notices, and schedule firmware updates where provided.
  • Monitor and log: start collecting and reviewing logs from cameras and the supporting infrastructure for unusual activity.

Near‑term operational steps

  • Conduct an inventory: know exactly which models and firmware versions you have — you cannot protect what you do not know you own.
  • Patching plan: work with suppliers to obtain and apply validated firmware updates; if none exist, mitigate by network controls.
  • Engage MSPs and suppliers: ensure service contracts include vulnerability management and clear escalation paths.

How ISO standards and good practice help

This is exactly the sort of failure an ISO 27001 information security management system is designed to reduce. Practical ISO 27001 controls around asset management, supplier relationships, access control and vulnerability management would have you documenting device ownership, regularly assessing risk, and ensuring supplier obligations for security updates and patching.

Linking this to business continuity, an ISO 22301 BCMS ensures you can keep essential services running — and communicating with customers — while technical teams remediate camera estates. If you want practical baseline controls to start with, Cyber Essentials and IASME certifications are useful for small and medium organisations to harden remote‑facing devices and management interfaces quickly.

Don’t forget people: changes to camera configuration and incident handling often involve estate managers and security staff who are not security specialists. Security awareness training helps make sure those teams understand the risks and act consistently — for example, avoiding shared default passwords or exposing admin panels to the internet.

Longer term: get ahead of the next camera‑class vulnerability

Treat IoT and physical security devices as first‑class assets in your ISMS. That means procurement clauses that demand vulnerability disclosure and patch timelines from suppliers, regular firmware reviews, clear supplier SLAs for security fixes and an asset‑aware patching policy. If you want operational rigour around procurement and supplier performance, tie that into ISO 9001 supplier management practices and make security a contractual requirement rather than a hopeful note in an email chain.

Also, test your incident response and recovery plans. Vulnerable devices can be the trigger for wider incidents — which is where a tested BCMS and incident playbooks pay for themselves. Think of backups and recovery as parachutes you’ve actually packed into the kit and briefly opened, not something you’ll figure out after the plane hits the turbulence.

Practical checklist for boards and leaders

Boards don’t need command‑line detail, but they do need assurance. Ask for a short report that shows:

  • a complete inventory of edge devices and their firmware versions;
  • evidence that critical devices are segmented off corporate networks;
  • supplier commitments to patching and disclosure;
  • an incident response playbook that includes physical security devices and a tested continuity plan.

If those items aren’t already on your dashboard, make them so this week.

Vulnerabilities like CVE‑2026‑0855 are a sharp reminder that the boundary between physical security and IT security has vanished. The fix is not glamorous — it’s inventory, segmentation, patching and supplier rigour — but it’s effective. If you’d like practical help building those routines into your management system in ways that map to standards such as ISO 27001, or if you need hands‑on support via ongoing support packages, there are clear, achievable steps to take now without rewriting your entire estate.

Take the sensible action: isolate affected cameras, apply vendor guidance or network mitigations, and fold IoT devices into your ISMS so the next high‑severity bulletin doesn’t blow a hole through your risk register.

Share This Post:

Facebook
Twitter
LinkedIn
Pinterest
Email
WhatsApp
Picture of Adam Cooke
Adam Cooke
As the Operations and Compliance Manager, Adam oversees all aspects of the business, ensuring operational efficiency and regulatory compliance. Committed to high standards, he ensures everyone is heard and supported. With a strong background in the railway industry, Adam values rigorous standards and safety. Outside of work, he enjoys dog walking, gardening, and exploring new places and cuisines.
What our clients say:
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue
Subscribe to our newsletter

Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.

Promotion nulla vitae elit libero a pharetra augue