Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2023-6895 PoC — Hikvision Intercom Broadcasting System ping.php os command injection

Source
Associated Vulnerability
Title:Hikvision Intercom Broadcasting System ping.php os command injection (CVE-2023-6895)
Description:A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.
Readme

# CVE-2023-6895 漏洞扫描器

这是一个简单的 Python 脚本,用于扫描网站以检查是否存在 CVE-2023-6895 漏洞。它发送修改过的请求到目标 URL,并检查响应中是否存在该漏洞。

## 环境要求

- Python 3
- requests 库
- tqdm 库

你可以使用 pip 安装所需的库:

pip install requests tqdm


## 使用方法

你可以使用以下命令运行脚本:

python CVE-2023-6895.py -u <URL> [-p <proxy>]

mathematica


或者,你可以指定包含目标 URL 列表的文件:

python CVE-2023-6895.py -f <file_path> [-p <proxy>]


- `-u, --url`: 指定单个目标 URL。
- `-f, --file`: 指定包含目标 URL 列表的文件。
- `-p, --proxy`: 如果需要,指定代理服务器。

## 示例

扫描单个 URL:

python CVE-2023-6895.py -u http://example.com


从文件中批量扫描 URL:

python CVE-2023-6895.py -f urls.txt


## 输出

脚本将显示一个进度条,指示扫描的进度。如果在某个 URL 中发现漏洞,它将打印一个成功消息,并将该 URL 保存到 `exploit.txt` 文件中。

## 免责声明

此脚本仅用于教育目的。请负责任地使用,并自行承担风险。
File Snapshot

[4.0K] /data/pocs/501dd733845377c98521487c28b4014c56e5a85c ├── [2.2K] CVE-2023-6895.py └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →