Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2025-45619 PoC — AVer PTC310UV2 安全漏洞

Source
Associated Vulnerability
Title:AVer PTC310UV2 安全漏洞 (CVE-2025-45619)
Description:An issue in Aver PTC310UV2 firmware v.0.1.0000.59 allows a remote attacker to execute arbitrary code via the SendAction function
Description
CVE proof of concept regarding the CVE-2025-45619 vulnerabillity.
Readme
**Issue details**

Camera model PTC310UV2 running firmware version 0.1.0000.59. The vulnerability is found in the web interface that is used to access the camera. The vulnerability was found during a penetration test, thus, certain information in the PoC screenshots have been redacted.

**Description**

This disclosure contains two vulnerabilities that has been identified in the AVer firmware login web interface. It should be noted that I am not very familiar with any of your products, meaning that some terms might not be used correctly. CVE-2025-45619 is the first of two vulnerabilities found during this investigation. The second vulnerability can be found here: https://github.com/weedl/CVE-2025-45620/tree/main 

CVE-2025-45619 relates to open endpoints on the host. One of these endpoints exposes the valid login credentials for the administrator user on the device. More precisely the endpoint found at  “https://[ipaddr]/action?get=acc” exposes valid login credentials in the tested version. The attached screenshot displays the issue:

<img width="1000" alt="bilde" src="https://github.com/user-attachments/assets/fe0b8ed5-3a15-41b8-80c5-455f9b401197" />

These credentials should not be stored on an open endpoint, moreover, they should not be stored in plaintext either. There may be other sensitive data stored on these endpoints, though, these have not been assessed in this investigation. I would suggest anyone with these systems in their environment to go over the endpoints, and should consider restricting access to them.
File Snapshot

[4.0K] /data/pocs/8957b0b5ed55e8c2089616f598e0a7d57e650a0f └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →