cve/2024/CVE-2024-13985.md
2025-09-29 21:09:30 +02:00

21 lines
1.3 KiB
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-13985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13985)
![](https://img.shields.io/static/v1?label=Product&message=EIMS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brightgreen)
### Description
A command injection vulnerability in Dahua EIMS versions prior to 2240008 allows unauthenticated remote attackers to execute arbitrary system commands via the capture_handle.action interface. The flaw stems from improper input validation in the captureCommand parameter, which is processed without sanitization or authentication. By sending crafted HTTP requests, attackers can inject OS-level commands that are executed on the server, leading to full system compromise. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-04-06 UTC.
### POC
#### Reference
- https://blog.csdn.net/weixin_43567873/article/details/136636198
- https://pentest-tools.com/vulnerabilities-exploits/dahua-eims-remote-command-execution_23961
- https://s4e.io/tools/dahua-eims-remote-code-execution
- https://www.vulncheck.com/advisories/dahua-eims-rce
#### Github
No PoCs found on GitHub currently.