Webs
tcp/85
This vulnerability (with proof of concept (PoC) code) affects DVR/NVR devices built using the HiSilicon hi3520d and similar system on a chip (SoC).
Exploiting the vulnerabilities lead to unauthorized remote code execution (RCE) using only the web interface, causing full takeover of the exploited device
Severity: high
Fingerprint: 321975614123c6c05f83e99b1156810acafa5fbbcafa5fbbcafa5fbbcafa5fbb
Found HiSiliconDVR firmware: Hardware: General ECT6304T Vulnerable to multiple issues : LFI, possibly RCE
Severity: high
Fingerprint: 321975614123c6c05f83e99b0bea47c0987bc785987bc785987bc785987bc785
Found HiSiliconDVR firmware: Hardware: General ECT7004T-MHV2 Vulnerable to multiple issues : LFI, possibly RCE
Open service 1.55.104.120:85
2024-06-15 14:07
HTTP/1.1 200 OK Date: Sat, 15 Jun 2024 21:07:19 GMT Server: Webs X-Frame-Options: SAMEORIGIN ETag: "0-c1b-1e0" Content-Length: 480 Content-Type: text/html Connection: close Last-Modified: Wed, 25 Sep 2019 08:02:22 GMT <!doctype html> <html> <head> <title></title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=edge" > <meta http-equiv="Pragma" content="no-cache" /> <meta http-equiv="Cache-Control" content="no-cache, must-revalidate" /> <meta http-equiv="Expires" content="0" /> </head> <body> </body> <script> window.location.href = "/doc/page/login.asp?_" + (new Date()).getTime(); </script> </html>
Open service 1.55.104.120:85
2024-06-13 12:51
HTTP/1.1 200 OK Date: Thu, 13 Jun 2024 19:51:57 GMT Server: Webs X-Frame-Options: SAMEORIGIN ETag: "0-c1b-1e0" Content-Length: 480 Content-Type: text/html Connection: close Last-Modified: Wed, 25 Sep 2019 08:02:22 GMT <!doctype html> <html> <head> <title></title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=edge" > <meta http-equiv="Pragma" content="no-cache" /> <meta http-equiv="Cache-Control" content="no-cache, must-revalidate" /> <meta http-equiv="Expires" content="0" /> </head> <body> </body> <script> window.location.href = "/doc/page/login.asp?_" + (new Date()).getTime(); </script> </html>