Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-36260

KEV EPSS 94.44% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-36260

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Hikvision Web Server 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Hikvision Web Server是中国海康威视(Hikvision)公司的一个Web服务器。用于解析协议,提供服务。 Hikvision Web Server 中存在操作系统命令注入漏洞,该漏洞源于输入验证不足。攻击者可利用该漏洞通过发送带有恶意命令的消息来发起命令注入攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-36260

#POC DescriptionSource LinkShenlong Link
1CVE-2021-36260https://github.com/rabbitsafe/CVE-2021-36260POC Details
2command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.https://github.com/Aiminsun/CVE-2021-36260POC Details
3the metasploit script(POC) about CVE-2021-36260 https://github.com/TaroballzChen/CVE-2021-36260-metasploitPOC Details
4CVE-2021-36260https://github.com/tuntin9x/CheckHKRCEPOC Details
5海康威视RCE漏洞 批量检测和利用工具https://github.com/Cuerz/CVE-2021-36260POC Details
6Nonehttps://github.com/TakenoSite/Simple-CVE-2021-36260POC Details
7Brute Hikvision CAMS with CVE-2021-36260 Exploithttps://github.com/r3t4k3r/hikvision_brutePOC Details
8Nonehttps://github.com/haingn/HIK-CVE-2021-36260-ExploitPOC Details
9A simple workflow that runs all Hikvision related nuclei templates on a given target.https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/hikvision-workflow.yamlPOC Details
10Certain Hikvision products contain a command injection vulnerability in the web server due to the insufficient input validation. An attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-36260.yamlPOC Details
11Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/HIKVISION%20DSIDSIPC%20%E7%AD%89%E8%AE%BE%E5%A4%87%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-36260.mdPOC Details
12Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/hikvision-unauthenticated-rce-cve-2021-36260.ymlPOC Details
13Brute Hikvision CAMS with CVE-2021-36260 Exploithttps://github.com/NanoTrash/hikvision_brutePOC Details
14HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web interface Version 3.1.3.150324 + CVE-2021-36260 Detectionhttps://github.com/tamim1089/HikvisionExploiterPOC Details
15Unauthenticated exposure of sensitive endpoints was detected on vulnerable Hikvision IP cameras. This included live snapshot feeds, encrypted configuration files, and full user credential XML through CVE-2021-36260 exploit chaining and bypass logic. https://github.com/projectdiscovery/nuclei-templates/blob/main/vulnerabilities/iot/hikvision/hikvision-cam-info-exposure.yamlPOC Details
16Unauthenticated exposure of sensitive endpoints was detected on vulnerable Hikvision IP cameras. This included live snapshot feeds, encrypted configuration files, and full user credential XML through CVE-2021-36260 exploit chaining and bypass logic. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/iot/hikvision-cam-info-exposure.yamlPOC Details
17Nonehttps://github.com/shubtheone/CVE-2021-36260-hikvisionPOC Details
18海康威视RCE漏洞 批量检测和利用工具https://github.com/yanxinwu946/hikvision-unauthenticated-rce-cve-2021-36260POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-36260

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-09-22 · 14 CVEs total

CVE-2020-23481CMS Made Simple 跨站脚本漏洞
CVE-2020-23478Leo-Editor 安全漏洞
CVE-2020-23469gedit 安全漏洞
CVE-2021-21992VMware vCenter Server 资源管理错误漏洞
CVE-2021-21991VMware vCenter Server 权限许可和访问控制问题漏洞
CVE-2019-6288Edgecore ECS2020 命令注入漏洞
CVE-2021-40684Talend ESB 授权问题漏洞
CVE-2021-40875Gurock Software Gurock TestRail 信息泄露漏洞
CVE-2021-37927Zoho Corporation ADManager Plus 数据伪造问题漏洞
CVE-2021-37925ZOHO ManageEngine ADManager Plus 操作系统命令注入漏洞
CVE-2021-39404MaianAffiliate 跨站脚本漏洞
CVE-2021-38112Amazon WorkSpaces 参数注入漏洞
CVE-2021-3583Red Hat Ansible 代码注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2021-36260

No comments yet


Leave a comment