.. / CVE-2023-6895

Exploit for Hikvision IP ping.php - Command Execution (CVE-2023-6895)

Description:

A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.

Nuclei Template

View the template here CVE-2023-6895.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-6895.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2023-6895
https://vuldb.com/?ctiid.248254
https://vuldb.com/?id.248254
https://github.com/tanjiti/sec_profile
https://github.com/xingchennb/POC-
https://github.com/wy876/POC