Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-36260 | https://github.com/rabbitsafe/CVE-2021-36260 | POC Details |
| 2 | command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. | https://github.com/Aiminsun/CVE-2021-36260 | POC Details |
| 3 | the metasploit script(POC) about CVE-2021-36260 | https://github.com/TaroballzChen/CVE-2021-36260-metasploit | POC Details |
| 4 | CVE-2021-36260 | https://github.com/tuntin9x/CheckHKRCE | POC Details |
| 5 | 海康威视RCE漏洞 批量检测和利用工具 | https://github.com/Cuerz/CVE-2021-36260 | POC Details |
| 6 | None | https://github.com/TakenoSite/Simple-CVE-2021-36260 | POC Details |
| 7 | Brute Hikvision CAMS with CVE-2021-36260 Exploit | https://github.com/r3t4k3r/hikvision_brute | POC Details |
| 8 | None | https://github.com/haingn/HIK-CVE-2021-36260-Exploit | POC Details |
| 9 | A simple workflow that runs all Hikvision related nuclei templates on a given target. | https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/hikvision-workflow.yaml | POC Details |
| 10 | Certain Hikvision products contain a command injection vulnerability in the web server due to the insufficient input validation. An attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-36260.yaml | POC Details |
| 11 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/HIKVISION%20DSIDSIPC%20%E7%AD%89%E8%AE%BE%E5%A4%87%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-36260.md | POC Details |
| 12 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/hikvision-unauthenticated-rce-cve-2021-36260.yml | POC Details |
| 13 | Brute Hikvision CAMS with CVE-2021-36260 Exploit | https://github.com/NanoTrash/hikvision_brute | POC Details |
| 14 | HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web interface Version 3.1.3.150324 + CVE-2021-36260 Detection | https://github.com/tamim1089/HikvisionExploiter | POC Details |
| 15 | Unauthenticated exposure of sensitive endpoints was detected on vulnerable Hikvision IP cameras. This included live snapshot feeds, encrypted configuration files, and full user credential XML through CVE-2021-36260 exploit chaining and bypass logic. | https://github.com/projectdiscovery/nuclei-templates/blob/main/vulnerabilities/iot/hikvision/hikvision-cam-info-exposure.yaml | POC Details |
| 16 | Unauthenticated exposure of sensitive endpoints was detected on vulnerable Hikvision IP cameras. This included live snapshot feeds, encrypted configuration files, and full user credential XML through CVE-2021-36260 exploit chaining and bypass logic. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/iot/hikvision-cam-info-exposure.yaml | POC Details |
| 17 | None | https://github.com/shubtheone/CVE-2021-36260-hikvision | POC Details |
| 18 | 海康威视RCE漏洞 批量检测和利用工具 | https://github.com/yanxinwu946/hikvision-unauthenticated-rce-cve-2021-36260 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-23481 | CMS Made Simple 跨站脚本漏洞 | |
| CVE-2020-23478 | Leo-Editor 安全漏洞 | |
| CVE-2020-23469 | gedit 安全漏洞 | |
| CVE-2021-21992 | VMware vCenter Server 资源管理错误漏洞 | |
| CVE-2021-21991 | VMware vCenter Server 权限许可和访问控制问题漏洞 | |
| CVE-2019-6288 | Edgecore ECS2020 命令注入漏洞 | |
| CVE-2021-40684 | Talend ESB 授权问题漏洞 | |
| CVE-2021-40875 | Gurock Software Gurock TestRail 信息泄露漏洞 | |
| CVE-2021-37927 | Zoho Corporation ADManager Plus 数据伪造问题漏洞 | |
| CVE-2021-37925 | ZOHO ManageEngine ADManager Plus 操作系统命令注入漏洞 | |
| CVE-2021-39404 | MaianAffiliate 跨站脚本漏洞 | |
| CVE-2021-38112 | Amazon WorkSpaces 参数注入漏洞 | |
| CVE-2021-3583 | Red Hat Ansible 代码注入漏洞 |
No comments yet