Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-36260
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Hikvision Web Server 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Hikvision Web Server是中国海康威视(Hikvision)公司的一个Web服务器。用于解析协议,提供服务。 Hikvision Web Server 中存在操作系统命令注入漏洞,该漏洞源于输入验证不足。攻击者可利用该漏洞通过发送带有恶意命令的消息来发起命令注入攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2021-36260
#POC DescriptionSource LinkShenlong Link
1CVE-2021-36260https://github.com/rabbitsafe/CVE-2021-36260POC Details
2command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.https://github.com/Aiminsun/CVE-2021-36260POC Details
3the metasploit script(POC) about CVE-2021-36260 https://github.com/TaroballzChen/CVE-2021-36260-metasploitPOC Details
4CVE-2021-36260https://github.com/tuntin9x/CheckHKRCEPOC Details
5海康威视RCE漏洞 批量检测和利用工具https://github.com/Cuerz/CVE-2021-36260POC Details
6Nonehttps://github.com/TakenoSite/Simple-CVE-2021-36260POC Details
7Brute Hikvision CAMS with CVE-2021-36260 Exploithttps://github.com/r3t4k3r/hikvision_brutePOC Details
8Nonehttps://github.com/haingn/HIK-CVE-2021-36260-ExploitPOC Details
9A simple workflow that runs all Hikvision related nuclei templates on a given target.https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/hikvision-workflow.yamlPOC Details
10Certain Hikvision products contain a command injection vulnerability in the web server due to the insufficient input validation. An attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-36260.yamlPOC Details
11Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/HIKVISION%20DSIDSIPC%20%E7%AD%89%E8%AE%BE%E5%A4%87%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-36260.mdPOC Details
12Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/hikvision-unauthenticated-rce-cve-2021-36260.ymlPOC Details
13Brute Hikvision CAMS with CVE-2021-36260 Exploithttps://github.com/NanoTrash/hikvision_brutePOC Details
14HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web interface Version 3.1.3.150324 + CVE-2021-36260 Detectionhttps://github.com/tamim1089/HikvisionExploiterPOC Details
15Unauthenticated exposure of sensitive endpoints was detected on vulnerable Hikvision IP cameras. This included live snapshot feeds, encrypted configuration files, and full user credential XML through CVE-2021-36260 exploit chaining and bypass logic. https://github.com/projectdiscovery/nuclei-templates/blob/main/vulnerabilities/iot/hikvision/hikvision-cam-info-exposure.yamlPOC Details
16Unauthenticated exposure of sensitive endpoints was detected on vulnerable Hikvision IP cameras. This included live snapshot feeds, encrypted configuration files, and full user credential XML through CVE-2021-36260 exploit chaining and bypass logic. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/iot/hikvision-cam-info-exposure.yamlPOC Details
17Nonehttps://github.com/shubtheone/CVE-2021-36260-hikvisionPOC Details
18海康威视RCE漏洞 批量检测和利用工具https://github.com/yanxinwu946/hikvision-unauthenticated-rce-cve-2021-36260POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-36260
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-36260

No comments yet


Leave a comment