mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
3.5 KiB
3.5 KiB
CVE-2021-36260
Description
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
POC
Reference
- http://packetstormsecurity.com/files/164603/Hikvision-Web-Server-Build-210702-Command-Injection.html
- http://packetstormsecurity.com/files/166167/Hikvision-IP-Camera-Unauthenticated-Command-Injection.html
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0xMarcio/cve
- https://github.com/1f3lse/taiE
- https://github.com/20142995/Goby
- https://github.com/20142995/sectool
- https://github.com/34zY/APT-Backpack
- https://github.com/4n4nk3/HikPwn
- https://github.com/APPHIK/cam
- https://github.com/APPHIK/camz
- https://github.com/APPHIK/ip
- https://github.com/APPHIK/ipp
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Aiminsun/CVE-2021-36260
- https://github.com/ArrestX/--POC
- https://github.com/Awrrays/FrameVul
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Cuerz/CVE-2021-36260
- https://github.com/Fans0n-Fan/Awesome-IoT-exp
- https://github.com/GhostTroops/TOP
- https://github.com/Haoke98/NetEye
- https://github.com/HimmelAward/Goby_POC
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Nxychx/TVT-NVR
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SYRTI/POC_to_review
- https://github.com/Stealzoz/steal
- https://github.com/TakenoSite/RemoteUploader
- https://github.com/TakenoSite/Simple-CVE-2021-36260
- https://github.com/TaroballzChen/CVE-2021-36260-metasploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/WhooAmii/POC_to_review
- https://github.com/Z0fhack/Goby_POC
- https://github.com/anquanscan/sec-tools
- https://github.com/bigblackhat/oFx
- https://github.com/bnhjuy77/tomde
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/haingn/HIK-CVE-2021-36260-Exploit
- https://github.com/hheeyywweellccoommee/hikvision_brute-jnrxx
- https://github.com/jorhelp/Ingram
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lisksemen/HikExp
- https://github.com/mcw0/PoC
- https://github.com/naycha/NVR-CONFIG
- https://github.com/naycha/TVT-NVR
- https://github.com/naycha/TVT-NVR-config
- https://github.com/naycha/TVT-config
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/r3t4k3r/hikvision_brute
- https://github.com/rabbitsafe/CVE-2021-36260
- https://github.com/readloud/PoC
- https://github.com/s0duku/PocSelenium
- https://github.com/soosmile/POC
- https://github.com/tanjiti/sec_profile
- https://github.com/trhacknon/Pocingit
- https://github.com/tuntin9x/CheckHKRCE
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/zecool/cve
- https://github.com/zhanwang110/Ingram