POC详情: ee74a243f26f0d72080dc93ba260339649b8135b

来源
关联漏洞
标题: NUUO Camera 注入漏洞 (CVE-2025-1338)
描述:NUUO Camera是NUUO的一系列网络摄像头。 NUUO Camera 20250203及之前版本存在注入漏洞,该漏洞源于/handle_config.php的print_file函数中,参数log存在命令注入。
描述
 This repository contains a proof-of-concept exploit script for CVE-2025-1338
介绍
# CVE-2025-1338
 This repository contains a proof-of-concept exploit script for CVE-2025-1338
 1.Introduction to NUUO-Camera
 NUUO camera is a network video recorder (NVR) produced by NUUO Company in Taiwan Province, China. It is widely used in many fields such as retail, transportation, education, government and banking.
 
2.Introduction to the vulnerability
 NUUO Camera 20250203 and earlier has an injection vulnerability, which originates from command injection in handle_config.php and __debugging_center_utils___.php with parameter log.
 • First inclusion: February 16, 2025
 • Impact version: version<=20250203
 • Exploit number: CVE-2025-1338

3.Use
 
 Example: python CVE-2025-1338.py -f url.txt -t 100  
 Parameter description:
 - `-f / --file`: Required. Path to the file containing the list of target URLs (one URL per line, supports both http and https).
- `-t / --threads`: Optional. Number of concurrent threads for detection. Default value is 10 (it is recommended not to exceed 200).
- `-o / --output`: Optional. Path to the output file for saving results. Default file name is "nuao_rce_results.txt" (only saves targets with vulnerabilities).
- `-v / --version`: Optional. Displays the help information for the script (same function as --help).
文件快照

[4.0K] /data/pocs/ee74a243f26f0d72080dc93ba260339649b8135b ├── [6.4K] CVE-2025-1338.py └── [1.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。