Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2021-36260 PoC — Hikvision Web Server 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Hikvision Web Server 操作系统命令注入漏洞 (CVE-2021-36260)
Description:A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
Readme
# CVE-2021-36260

Check whether the Sleep command is executed.

# execution
1: check()

        rhost:str # target_host
        rport:int # target_port


2: SelfCommand()

        rhost:str   # target_host
        rport:int   # target_port
        command:str # os command
File Snapshot

[4.0K] /data/pocs/22bdb0ec07e72d18ccf64e2726c18fd90c7c5544 ├── [2.6K] CVE-2021-36260.py └── [ 273] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →