Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-52163

KEV EPSS 69.50% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-52163

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Digiever DS-2105 Pro 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Digiever DS-2105 Pro是Digiever公司的一个网络录像机。 Digiever DS-2105 Pro 3.1.0.71-11版本存在安全漏洞,该漏洞源于允许 time_tzsetup.cgi 命令注入。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-52163

#POC DescriptionSource LinkShenlong Link
1Digiever DS-2105 Pro 3.1.0.71-11 contains a command injection caused by unsanitized input in time_tzsetup.cgi, letting attackers execute arbitrary commands remotely, exploit requires no authentication. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-52163.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-52163

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-02-03 · 34 CVEs total

CVE-2025-09735.4 MEDIUMCmsEasy index.php backAll_action path traversal
CVE-2024-569465.3 MEDIUMTechnitium DNS Server 安全漏洞
CVE-2024-34896Nedis SmartLife 安全漏洞
CVE-2024-57097ClassCMS 安全漏洞
CVE-2024-57452ChestnutCMS 安全漏洞
CVE-2024-57450ChestnutCMS 安全漏洞
CVE-2024-57498ForestBlog 安全漏洞
CVE-2024-57451ChestnutCMS 安全漏洞
CVE-2024-44449Quorum onQ 安全漏洞
CVE-2024-57098Moss 安全漏洞
CVE-2024-34897Nedis SmartLife 安全漏洞
CVE-2024-56898Geovision GV-ASWeb 安全漏洞
CVE-2024-56901Geovision GV-ASWeb 安全漏洞
CVE-2024-56902Geovision GV-ASWeb 安全漏洞
CVE-2024-56903Geovision GV-ASWeb 安全漏洞
CVE-2025-22918Polycom RealPresence Group 500 安全漏洞
CVE-2023-52164Digiever DS-2105 Pro 安全漏洞
CVE-2024-57099ClassCMS 安全漏洞
CVE-2025-22978ELADMIN 安全漏洞
CVE-2024-56921Open5GS 安全漏洞

Showing top 20 of 34 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-52163

Anonymous User
2026-01-15 06:08:29

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment