This vulnerability (with proof of concept (PoC) code) affects DVR/NVR devices built using the HiSilicon hi3520d and similar system on a chip (SoC).
Exploiting the vulnerabilities lead to unauthorized remote code execution (RCE) using only the web interface, causing full takeover of the exploited device
Severity: high
Fingerprint: 321975614123c6c05f83e99bfb4e8962a08c5333a08c5333a08c5333a08c5333
Found HiSiliconDVR firmware: Hardware: General AHB7008T-LME-V3 Vulnerable to multiple issues : LFI, possibly RCE
Open service 223.205.140.85:8022
2024-09-11 17:30
Open service 223.205.140.85:88
2024-09-09 22:31
HTTP/1.1 200 OK Vary: Accept-Encoding X-Frame-Options: SAMEORIGIN Content-Type: text/html X-Content-Type-Options: nosniff Date: Tue, 10 Sep 2024 05:31:51 GMT ETag: 1725815773 Content-Length: 481 X-XSS-Protection: 1; mode=block Last-Modified: Thu, 31 Mar 2022 06:43:05 GMT Connection: close Accept-Ranges: bytes <!doctype html> <html> <head> <title></title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=edge" > <meta http-equiv="Pragma" content="no-cache" /> <meta http-equiv="Cache-Control" content="no-cache, must-revalidate" /> <meta http-equiv="Expires" content="0" /> </head> <body> </body> <script> window.location.href = "./doc/page/login.asp?_" + (new Date()).getTime(); </script> </html>