Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-28810 PoC — Hikvision Access Control 安全漏洞

Source
Associated Vulnerability
Title:Hikvision Access Control 安全漏洞 (CVE-2023-28810)
Description:Some access control/intercom products have unauthorized modification of device network configuration vulnerabilities. Attackers can modify device network configuration by sending specific data packets to the vulnerable interface within the same local network.
Description
Exploit code for CVE-2023-28810
Readme
# CVE-2023-28810
Exploit code for CVE-2023-28810.

## udp-config-changer.py
Change the running configuration of a target hikvision intercom without needing any authentication.

## udp-password-brute.py
Attempt to recover the admin password for the device via brute force guessing (wordlist not supplied).

## SIP-ghost-caller.py
Bonus code for making the targeted intercom ring via unauthenticated SIP INVITE message.
File Snapshot

[4.0K] /data/pocs/98913e0683c3f77a4e807f1b89bb5b296dd25bdd ├── [ 418] README.md ├── [ 908] SIP-ghost-caller.py ├── [1.5K] udp-config-changer.py └── [2.8K] udp-password-brute.py 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →