Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-9529 PoC — Shenzhen Hichip Vision Technology Firmware 安全漏洞

Source
Associated Vulnerability
Title:Shenzhen Hichip Vision Technology Firmware 安全漏洞 (CVE-2020-9529)
Description:Shenzhen Hichip Vision Technology Firmware是中国深圳海芯威视(Shenzhen Hichip Vision)公司的一款用于物联网设备中的固件。 Shenzhen Hichip Vision Technology Firmware V6版本至V20版本中存在提权漏洞。攻击者可利用该漏洞重置设备的管理员密码。以下产品及版本受到影响:Accfly;Alptop;Anlink;Besdersec;BOAVISION;COOAU;CPVAN;Ctronics;D3D Sec
Description
Hicip IP admin password reset script using CVE-2020-9529. This is made for educational purposes only. 
Readme
well i need to add some stuff here it's cve exploit, can we consider this as an exploit? i dont think so, it's more than a cve "exploiter", i dont like to call this such as that. use this for education purposes only, of course
File Snapshot

[4.0K] /data/pocs/530cc7183c53c52d5a45196bca479b64910b2aab ├── [1.5K] LICENSE ├── [ 227] README.md └── [4.5K] reset.c 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.