A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag:
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
sicehice | https://twitter.com/sicehice/status/1636055461899259904/pho... | Source sicehice 1636055461899259904 | 2023/03/16 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 194 |
www.reddit.com | 59 |
cvetrends.com | 49 |
twinybots.ch | 42 |
lists.astaro.com | 29 |
us-cert.cisa.gov | 13 |
www.bleepingcomputer.com | 5 |
github.com | 4 |
securityaffairs.co | 4 |
watchfulip.github.io | 4 |
bit.ly | 3 |
youtu.be | 3 |
twitter.com | 3 |
gbhackers.com | 3 |
attackerkb.com | 3 |
www.hikvision.com | 3 |
User | URL | Info Source |
---|---|---|
sicehice | twitter.com | Show Tweet |
Name | URL |
---|---|
Aiminsun/CVE-2021-36260 | https://github.com/Aiminsun/CVE-2021-36260 |
rabbitsafe/CVE-2021-36260 | https://github.com/rabbitsafe/CVE-2021-36260 |
TaroballzChen/CVE-2021-36260-metasploit | https://github.com/TaroballzChen/CVE-2021-36260-metasploit |
tuntin9x/CheckHKRCE | https://github.com/tuntin9x/CheckHKRCE |
Name | URL |
---|---|
Aiminsun/CVE-2021-36260 | github.com |
rabbitsafe/CVE-2021-36260 | github.com |
TaroballzChen/CVE-2021-36260-metasploit | github.com |
tuntin9x/CheckHKRCE | github.com |