Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-25012 PoC — Argus Surveillance Dvr 加密问题漏洞

Source
Associated Vulnerability
Title:Argus Surveillance Dvr 加密问题漏洞 (CVE-2022-25012)
Description:Argus Surveillance DVR v4.0 employs weak password encryption.
Description
Updated version of this weak password encryption script
Readme
# Argus Surveillance DVR 4.0 - Weak Password Encryption
## CVE-2022-25012
Updated version of this weak password encryption script

Exploit DB REF: https://www.exploit-db.com/exploits/50130

Author REF: https://deathflash1411.github.io/blog/dvr4-hash-crack

NIST REF: https://nvd.nist.gov/vuln/detail/CVE-2022-25012

## Description:
The author had stated that they didnt make additional entries for special ASCII characters. 
I have updated this to include them and provide a password output to make it more user friendly
as well as it accepting arguements rather than needing to edit the script to place the password hash.

## Usage

`python3 CVE-2022-25012.py <hash>`

Example:

`python3 CVE-2022-25012.py E1B0BD8F4D7B73573F7EF539A935735753D190839083C165BD8FCA79418DB398F7DF`



## Generating our own proof of concept

We set a complex password in the argus DVR user screen

![image](https://user-images.githubusercontent.com/60675004/229265535-5a17dbe9-0de1-4800-9605-0b644745f533.png)

Using other avenues to gain access to the following file: `C:\ProgramData\PY_Software\Argus Surveillance DVR\DVRParams.ini`

We can see the entry for our user and corresponding password:

![image](https://user-images.githubusercontent.com/60675004/229265593-23edff63-3d29-48d4-acf9-49193dd73101.png)

We can then run this hash as an arguement (as seen in the usage example)

![image](https://user-images.githubusercontent.com/60675004/229265784-9c33acff-c749-461d-8f0b-4ca9a3130831.png)




File Snapshot

[4.0K] /data/pocs/4314d193299b471c7c276e76e0ce4e57f5a07d49 ├── [3.3K] CVE-2022-25012.py ├── [1.0K] LICENSE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →