Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-28810 PoC — Hikvision Access Control 安全漏洞

Source
Associated Vulnerability
Title:Hikvision Access Control 安全漏洞 (CVE-2023-28810)
Description:Hikvision DS-K1T和Hikvision DS-KH都是中国海康威视(Hikvision)公司的一系列门禁系统。 Hikvision Access Control 存在安全漏洞,该漏洞源于存在擅自修改设备网络配置的问题。攻击者可利用该漏洞通过向同一本地网络发送特定数据包来修改设备网络配置。以下产品及版本受到影响:Hikvision DS-K1T,Hikvision DS-KH。
Description
Exploit code for CVE-2023-28810
Readme
# CVE-2023-28810
Exploit code for CVE-2023-28810.

## udp-config-changer.py
Change the running configuration of a target hikvision intercom without needing any authentication.

## udp-password-brute.py
Attempt to recover the admin password for the device via brute force guessing (wordlist not supplied).

## SIP-ghost-caller.py
Bonus code for making the targeted intercom ring via unauthenticated SIP INVITE message.
File Snapshot

[4.0K] /data/pocs/98913e0683c3f77a4e807f1b89bb5b296dd25bdd ├── [ 418] README.md ├── [ 908] SIP-ghost-caller.py ├── [1.5K] udp-config-changer.py └── [2.8K] udp-password-brute.py 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.