INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h
Vulnerabilities

CVE-2026-0854

High
Merit LILIN DVR/NVR OS Command Injection Vulnerability (CVE-2026-0854)
CWE-78 — Weakness Type
Published: Jan 12, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

Certain DVR/NVR models developed by Merit LILIN has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the device.

🤖 AI Executive Summary

Merit LILIN DVR/NVR devices contain an OS command injection vulnerability (CWE-78) with CVSS 8.8. Authenticated remote attackers can inject and execute arbitrary operating system commands on affected devices, potentially leading to complete system compromise.

📄 Description (Arabic)

تعاني بعض طرازات أجهزة DVR/NVR المطورة من قبل Merit LILIN من ثغرة حقن أوامر نظام التشغيل الحرجة. تسمح هذه الثغرة للمهاجمين المصادق عليهم عن بُعد بحقن أوامر نظام تشغيل عشوائية وتنفيذها على الجهاز المستهدف. يمكن استغلال هذه الثغرة للحصول على صلاحيات كاملة على النظام، والوصول إلى تسجيلات الفيديو الحساسة، وتعطيل أنظمة المراقبة الأمنية. تشكل هذه الثغرة خطراً كبيراً على البنية التحتية الأمنية الفيزيائية للمؤسسات التي تعتمد على هذه الأجهزة.

🤖 ملخص تنفيذي (AI)

تحتوي أجهزة DVR/NVR من Merit LILIN على ثغرة حقن أوامر نظام التشغيل (CWE-78) بدرجة خطورة 8.8. يمكن للمهاجمين عن بُعد المصادق عليهم حقن وتنفيذ أوامر نظام تشغيل عشوائية على الأجهزة المتأثرة، مما قد يؤدي إلى اختراق كامل للنظام.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 08:23
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Merit LILIN DVR/NVR systems for physical security surveillance face significant risk of unauthorized access to video surveillance infrastructure, potential data breaches of recorded footage, and compromise of critical security monitoring systems. This particularly affects government facilities, financial institutions, and critical infrastructure sectors required to maintain continuous security monitoring under NCA and SAMA regulations.
🏢 Affected Saudi Sectors
القطاع المالي والمصرفي القطاع الحكومي البنية التحتية الحرجة قطاع الطاقة قطاع الاتصالات قطاع الرعاية الصحية المرافق الأمنية والعسكرية
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately isolate affected Merit LILIN DVR/NVR devices from public internet access and place them behind properly configured firewalls with strict access control lists limiting access to authorized management networks only.
2. Implement network segmentation to separate video surveillance systems from corporate networks, enforce strong authentication mechanisms, change all default credentials, and enable comprehensive logging and monitoring for all device access attempts.
3. Contact Merit LILIN for security patches and firmware updates, establish a vulnerability management process to track vendor advisories, and consider replacing affected devices with alternative solutions if patches are not available within acceptable timeframes per organizational risk tolerance.
🔧 خطوات المعالجة (العربية)
1. عزل أجهزة DVR/NVR المتأثرة من Merit LILIN فوراً عن الوصول للإنترنت العام ووضعها خلف جدران نارية مكونة بشكل صحيح مع قوائم تحكم وصول صارمة تقتصر على شبكات الإدارة المصرح بها فقط.
2. تطبيق تجزئة الشبكات لفصل أنظمة المراقبة بالفيديو عن الشبكات المؤسسية، وفرض آليات مصادقة قوية، وتغيير جميع بيانات الاعتماد الافتراضية، وتفعيل التسجيل والمراقبة الشاملة لجميع محاولات الوصول للأجهزة.
3. التواصل مع Merit LILIN للحصول على تصحيحات أمنية وتحديثات البرامج الثابتة، وإنشاء عملية إدارة الثغرات لتتبع نشرات البائع الأمنية، والنظر في استبدال الأجهزة المتأثرة بحلول بديلة إذا لم تتوفر التصحيحات خلال أطر زمنية مقبولة وفقاً لتحمل المخاطر المؤسسي.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-1 ECC-1-2 ECC-3-1 ECC-4-1 ECC-5-1 ECC-5-2
🔵 SAMA CSF
CCC-1.1 CCC-2.1 CCC-3.1 CCC-4.1 TRM-1.1 TRM-2.1
🟡 ISO 27001:2022
A.12.6.1 A.13.1.1 A.13.1.3 A.14.2.5 A.18.2.3
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-78
EPSS0.36%
Exploit No
Patch ✓ Yes
Published 2026-01-12
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-78
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.