Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-45619 PoC — AVer PTC310UV2 安全漏洞

Source
Associated Vulnerability
Title:AVer PTC310UV2 安全漏洞 (CVE-2025-45619)
Description:AVer PTC310UV2是美国AVer公司的一款自动追踪摄影机。 Aver PTC310UV2 v.0.1.0000.59版本存在安全漏洞,该漏洞源于SendAction函数,可能导致远程执行任意代码。
Description
CVE proof of concept regarding the CVE-2025-45619 vulnerabillity.
Readme
**Issue details**

Camera model PTC310UV2 running firmware version 0.1.0000.59. The vulnerability is found in the web interface that is used to access the camera. The vulnerability was found during a penetration test, thus, certain information in the PoC screenshots have been redacted.

**Description**

This disclosure contains two vulnerabilities that has been identified in the AVer firmware login web interface. It should be noted that I am not very familiar with any of your products, meaning that some terms might not be used correctly. CVE-2025-45619 is the first of two vulnerabilities found during this investigation. The second vulnerability can be found here: https://github.com/weedl/CVE-2025-45620/tree/main 

CVE-2025-45619 relates to open endpoints on the host. One of these endpoints exposes the valid login credentials for the administrator user on the device. More precisely the endpoint found at  “https://[ipaddr]/action?get=acc” exposes valid login credentials in the tested version. The attached screenshot displays the issue:

<img width="1000" alt="bilde" src="https://github.com/user-attachments/assets/fe0b8ed5-3a15-41b8-80c5-455f9b401197" />

These credentials should not be stored on an open endpoint, moreover, they should not be stored in plaintext either. There may be other sensitive data stored on these endpoints, though, these have not been assessed in this investigation. I would suggest anyone with these systems in their environment to go over the endpoints, and should consider restricting access to them.
File Snapshot

[4.0K] /data/pocs/8957b0b5ed55e8c2089616f598e0a7d57e650a0f └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.