Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-36260 | https://github.com/rabbitsafe/CVE-2021-36260 | POC Details |
| 2 | command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. | https://github.com/Aiminsun/CVE-2021-36260 | POC Details |
| 3 | the metasploit script(POC) about CVE-2021-36260 | https://github.com/TaroballzChen/CVE-2021-36260-metasploit | POC Details |
| 4 | CVE-2021-36260 | https://github.com/tuntin9x/CheckHKRCE | POC Details |
| 5 | 海康威视RCE漏洞 批量检测和利用工具 | https://github.com/Cuerz/CVE-2021-36260 | POC Details |
| 6 | None | https://github.com/TakenoSite/Simple-CVE-2021-36260 | POC Details |
| 7 | Brute Hikvision CAMS with CVE-2021-36260 Exploit | https://github.com/r3t4k3r/hikvision_brute | POC Details |
| 8 | None | https://github.com/haingn/HIK-CVE-2021-36260-Exploit | POC Details |
| 9 | A simple workflow that runs all Hikvision related nuclei templates on a given target. | https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/hikvision-workflow.yaml | POC Details |
| 10 | Certain Hikvision products contain a command injection vulnerability in the web server due to the insufficient input validation. An attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-36260.yaml | POC Details |
| 11 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/HIKVISION%20DSIDSIPC%20%E7%AD%89%E8%AE%BE%E5%A4%87%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-36260.md | POC Details |
| 12 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/hikvision-unauthenticated-rce-cve-2021-36260.yml | POC Details |
| 13 | Brute Hikvision CAMS with CVE-2021-36260 Exploit | https://github.com/NanoTrash/hikvision_brute | POC Details |
| 14 | HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web interface Version 3.1.3.150324 + CVE-2021-36260 Detection | https://github.com/tamim1089/HikvisionExploiter | POC Details |
| 15 | Unauthenticated exposure of sensitive endpoints was detected on vulnerable Hikvision IP cameras. This included live snapshot feeds, encrypted configuration files, and full user credential XML through CVE-2021-36260 exploit chaining and bypass logic. | https://github.com/projectdiscovery/nuclei-templates/blob/main/vulnerabilities/iot/hikvision/hikvision-cam-info-exposure.yaml | POC Details |
| 16 | Unauthenticated exposure of sensitive endpoints was detected on vulnerable Hikvision IP cameras. This included live snapshot feeds, encrypted configuration files, and full user credential XML through CVE-2021-36260 exploit chaining and bypass logic. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/iot/hikvision-cam-info-exposure.yaml | POC Details |
| 17 | None | https://github.com/shubtheone/CVE-2021-36260-hikvision | POC Details |
| 18 | 海康威视RCE漏洞 批量检测和利用工具 | https://github.com/yanxinwu946/hikvision-unauthenticated-rce-cve-2021-36260 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet