Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-22514 PoC — iSpyConnect.com Agent DVR 安全漏洞

Source
Associated Vulnerability
Title:iSpyConnect.com Agent DVR 安全漏洞 (CVE-2024-22514)
Description:iSpyConnect.com Agent DVR是一套跨平台的视频监控软件。 iSpyConnect.com Agent DVR 5.1.6.0版本存在安全漏洞。攻击者利用该漏洞通过恢复特制的备份文件来运行任意文件。
Readme
# CVE-2024-22514: Remote Code Execution in Agent DVR

## Information

### Description
iSpyConnect.com Agent DVR 5.1.6.0 contains a vulnerability which allows the file triggered by alert commands to be redirected. The modification can allow the commands function to trigger any file on the system under the permissions context of the program (root by default). This is done by editing the EXE param path in the objects.xml backup file, to create a modified objects.xml file, which can then be restored to through the dashboard. The restored dashboard will retain the new path placed in the objects.xml file which can then be triggered by alert commands.

### Additional Information
This attack may be chained with an additional CVE I will submit which includes an arbitrary file upload vulnerability. By chaining these two together, any arbitrary file may be uploaded and executed remotely by an authenticated user.

### Affected Versions
- **Versions Affected:** 5.1.6.0 (Other versions may also be impacted)

### Fixed Version
- **Version Fixed:** 5.1.7.0

### Researcher
- **Identified by:** Dylan W. Como

### Disclosure
- **Disclosure Link:** [GitHub Repository](https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution)

### References
- **NIST CVE Link:** [NVD - CVE-2024-22514](https://nvd.nist.gov/vuln/detail/CVE-2024-22514)

## Proof-of-Concept Exploit
For detailed technical insights or to replicate the security findings in a controlled environment, refer to the proof-of-concept exploit available at:

- [GitHub PoC Repository](https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution)
File Snapshot

[4.0K] /data/pocs/f4d47b13349821da56c725d6a458a793d97f840b └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.