exploitdb
WORKING POC
by ezelf · pythonremotehardware
https://www.exploit-db.com/exploits/44577
This exploit targets a credential exposure vulnerability in DVR devices by sending a crafted HTTP request to retrieve user credentials in JSON format. It parses and displays the extracted usernames, passwords, and role IDs in a table.
Classification
Working Poc 95%
Target:
DVR devices (specific models/vendors not specified)
No auth needed
Prerequisites:
Network access to the target DVR device · Target device must be exposed on the specified port (default: 80)
nomisec
WORKING POC
554 stars
by ezelf · infoleak
https://github.com/ezelf/CVE-2018-9995_dvr_credentials
This repository contains a Python script that exploits CVE-2018-9995, an information disclosure vulnerability in various DVR devices. The exploit retrieves user credentials by sending a crafted HTTP request to the vulnerable endpoint.
Classification
Working Poc 95%
Target:
Multiple DVR vendors (Novo, CeNova, QSee, Pulnix, etc.)
No auth needed
Prerequisites:
Network access to the vulnerable DVR device
nomisec
WORKING POC
111 stars
by Cyb0r9 · infoleak
https://github.com/Cyb0r9/DVR-Exploiter
This exploit targets CVE-2018-9995, an information disclosure vulnerability in DVR devices. It sends a crafted HTTP request to '/device.rsp?opt=user&cmd=list' to expose user credentials without authentication.
Classification
Working Poc 90%
Target:
DVR devices (Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, etc.)
No auth needed
Prerequisites:
network access to the vulnerable DVR device
nomisec
WORKING POC
95 stars
by 0xDamian · infoleak
https://github.com/0xDamian/CVE-2018-9995-rs
This is a Rust-based PoC exploit for CVE-2018-9995, which targets a credential disclosure vulnerability in DVR devices. It sends a crafted HTTP request to retrieve user credentials in JSON format.
Classification
Working Poc 95%
Target:
DVR devices with vulnerable firmware (e.g., GNU rsp/1.0)
No auth needed
Prerequisites:
Network access to the vulnerable DVR device · Device must be exposed to the internet or local network
nomisec
WORKING POC
11 stars
by X3RX3SSec · infoleak
https://github.com/X3RX3SSec/DVR_Sploit
This Python script exploits CVE-2018-9995, a vulnerability in DVR devices, by sending a crafted HTTP request to retrieve a list of user credentials. It automates the exploitation process and saves the output to a file.
Classification
Working Poc 90%
Target:
DVR devices (multiple vendors)
No auth needed
Prerequisites:
Network access to the target DVR device · Python 3 with the 'requests' library
nomisec
WORKING POC
8 stars
by K3ysTr0K3R · infoleak
https://github.com/K3ysTr0K3R/CVE-2018-9995-EXPLOIT
This PoC exploits CVE-2018-9995, an authentication bypass vulnerability in various DVR devices. It sends a crafted request with a 'Cookie: uid=admin' header to retrieve sensitive credentials from the device's JSON response.
Classification
Working Poc 95%
Target:
TBK DVR4104, DVR4216, and other re-branded DVR devices
No auth needed
Prerequisites:
Network access to the target DVR device
nomisec
WORKING POC
4 stars
by kienquoc102 · remote-auth
https://github.com/kienquoc102/CVE-2018-9995-2
This exploit targets CVE-2018-9995, a vulnerability in DVR/NVR devices that allows unauthenticated credential disclosure. The PoC sends a crafted request to '/device.rsp?opt=user&cmd=list' to extract admin credentials.
Classification
Working Poc 95%
Target:
DVR/NVR devices (Novo, CeNova, QSee, etc.)
No auth needed
Prerequisites:
Network access to the target device
nomisec
SCANNER
4 stars
by zzh217 · remote-auth
https://github.com/zzh217/CVE-2018-9995_Batch_scanning_exp
This repository contains a batch scanning tool for CVE-2018-9995, a vulnerability in D-Link routers. The script uses asynchronous requests to scan multiple targets for the presence of the vulnerability.
Classification
Scanner 90%
Target:
D-Link routers (multiple models)
No auth needed
Prerequisites:
List of target IPs or URLs
nomisec
WORKING POC
3 stars
by wmasday · remote
https://github.com/wmasday/HTC
This PoC exploits CVE-2018-9995, an information disclosure vulnerability in DVR devices, by retrieving hardcoded credentials from the device.rsp endpoint. It uses a simple HTTP request to extract username and password from the response.
Classification
Working Poc 90%
Target:
DVR devices (various vendors)
No auth needed
Prerequisites:
Target device with exposed /device.rsp endpoint
nomisec
WORKING POC
2 stars
by codeholic2k18 · remote
https://github.com/codeholic2k18/CVE-2018-9995
This repository contains a Python script that exploits CVE-2018-9995, an information disclosure vulnerability in various DVR devices. The exploit retrieves user credentials by sending a crafted HTTP request to the vulnerable endpoint.
Classification
Working Poc 95%
Target:
Multiple DVR vendors (Novo, CeNova, QSee, etc.)
No auth needed
Prerequisites:
Network access to the vulnerable DVR device
nomisec
SCANNER
2 stars
by gwolfs · poc
https://github.com/gwolfs/CVE-2018-9995-ModifiedByGwolfs
This repository provides a modified version of the CVE-2018-9995 exploit, which targets DVR credentials by leveraging Shodan for discovery. It includes scripts to search for vulnerable devices and extract credentials, but lacks direct exploit code for the vulnerability itself.
Classification
Scanner 90%
Target:
DVR devices with CVE-2018-9995 vulnerability
No auth needed
Prerequisites:
Shodan API key · Metasploit Framework
nomisec
SCANNER
2 stars
by Huangkey · remote
https://github.com/Huangkey/CVE-2018-9995_check
This repository contains a Python script to scan for CVE-2018-9995, a vulnerability in DVR series cameras. It checks for the presence of the vulnerable server header and logs vulnerable hosts to a file.
Classification
Scanner 100%
Target:
DVR series cameras with GNU rsp/1.0 server header
No auth needed
Prerequisites:
List of target hosts in a text file
nomisec
WORKING POC
1 stars
by ST0PL · infoleak
https://github.com/ST0PL/DVRFaultNET
This repository contains a C# PoC for CVE-2018-9995, which exploits an authentication bypass vulnerability in DVR devices. The tool sends a crafted HTTP request to retrieve user credentials and device information without authentication.
Classification
Working Poc 95%
Target:
DVR devices (e.g., TVT, HIKVISION, and other rebranded devices)
No auth needed
Prerequisites:
Network access to the vulnerable DVR device
nomisec
WORKING POC
1 stars
by Saeed22487 · remote-auth
https://github.com/Saeed22487/CVE-2018-9995
This PoC exploits CVE-2018-9995, an information disclosure vulnerability in DVR devices, by sending a crafted HTTP request to retrieve user credentials without authentication. The script parses the JSON response and displays the extracted usernames, passwords, and roles in a table format.
Classification
Working Poc 95%
Target:
DVR devices (unspecified models)
No auth needed
Prerequisites:
Network access to the target DVR device · Target device must be exposed on the specified port (default: 80)
nomisec
WORKING POC
1 stars
by awesome-consumer-iot · poc
https://github.com/awesome-consumer-iot/HTC
This PoC exploits CVE-2018-9995, an information disclosure vulnerability in DVR devices, by retrieving exposed credentials via an unauthenticated HTTP request to '/device.rsp?opt=user&cmd=list'. The script automates the extraction of usernames and passwords from vulnerable devices.
Classification
Working Poc 90%
Target:
DVR devices (various vendors, e.g., TVT, HIKVISION, etc.)
No auth needed
Prerequisites:
Target device must be exposed to the internet with '/login.rsp' accessible · Device must be vulnerable to CVE-2018-9995
nomisec
WORKING POC
1 stars
by b510 · remote-auth
https://github.com/b510/CVE-2018-9995-POC
This PoC exploits CVE-2018-9995, an authentication bypass vulnerability in DVR devices, to extract user credentials via a crafted request to the device.rsp endpoint. It supports multi-threading and proxy usage for batch exploitation.
Classification
Working Poc 95%
Target:
DVR devices (e.g., TVT, HIKVISION, and other rebranded devices)
No auth needed
Prerequisites:
Target IP addresses and ports · Network access to the vulnerable devices
nomisec
WORKING POC
1 stars
by MrAli-Code · poc
https://github.com/MrAli-Code/CVE-2018-9995_dvr_credentials
This repository contains a Python script that exploits CVE-2018-9995 to retrieve DVR credentials by sending a crafted HTTP request to an exposed endpoint. The exploit leverages an authentication bypass vulnerability in various DVR systems.
Classification
Working Poc 95%
Target:
Multiple DVR systems (Novo, CeNova, QSee, etc.)
No auth needed
Prerequisites:
Network access to the target DVR system · Exposed device.rsp endpoint
nomisec
WORKING POC
1 stars
by mesutozsoycom · poc
https://github.com/mesutozsoycom/cve-2018-9995
This exploit targets CVE-2018-9995, an authentication bypass vulnerability in DVR devices. It sends a crafted HTTP request to retrieve user credentials without authentication.
Classification
Working Poc 90%
Target:
DVR devices (e.g., Novo CeNova, QSee, Pulnix, Securus, Night OWL)
No auth needed
Prerequisites:
network access to the target device · knowledge of the target IP and port
gitlab
WORKING POC
by softdream · infoleak
https://gitlab.com/softdream/CVE-2018-9995_dvr_credentials
This repository contains a functional Python script that exploits CVE-2018-9995, an information disclosure vulnerability in various DVR devices. The exploit retrieves user credentials by sending a crafted HTTP request to the vulnerable endpoint.
Classification
Working Poc 95%
Target:
Multiple DVR vendors (Novo, CeNova, QSee, etc.)
No auth needed
Prerequisites:
Network access to the vulnerable DVR device
nomisec
WRITEUP
by jameseyes · poc
https://github.com/jameseyes/DVRC
This repository is a documentation and installation guide for pyenv, a Python version management tool. It does not contain exploit code or a PoC for CVE-2028-9995.
Classification
Writeup 100%
Target:
pyenv
No auth needed
nomisec
WORKING POC
by its-anya · infoleak
https://github.com/its-anya/DVR_Credential_Scanner
This repository contains a Python-based scanner and exploit for CVE-2018-9995, which allows unauthorized extraction of credentials from vulnerable DVR systems via a crafted HTTP request with a spoofed admin cookie. The PoC includes both interactive and command-line modes for testing.
Classification
Working Poc | Scanner 95%
Attack Type
Info Leak | Auth Bypass
Target:
Various DVR systems (e.g., Novo, CeNova, QSee, etc.)
No auth needed
Prerequisites:
Network access to the target DVR system · Python 3.6 or higher
nomisec
WORKING POC
by batmoshka55 · infoleak
https://github.com/batmoshka55/CVE-2018-9995_dvr_credentials
This repository contains a Python-based exploit for CVE-2018-9995, which leaks DVR credentials by sending a crafted HTTP request to an affected device. The exploit targets multiple DVR vendors and includes a script to automate credential extraction.
Classification
Working Poc 95%
Target:
Multiple DVR vendors (Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, etc.)
No auth needed
Prerequisites:
Network access to the target DVR device · Port 80 or custom port exposed
nomisec
STUB
by A-Alabdoo · infoleak
https://github.com/A-Alabdoo/CVE-DVr
This script appears to be a partial or incomplete PoC for CVE-2018-9995, targeting a DVR device. It sends a request to a hardcoded IP and port to list users but lacks exploit functionality.
Target:
DVR devices (specific vendor/model unclear)
No auth needed
Prerequisites:
Network access to the target device
nomisec
WORKING POC
by dego905 · remote
https://github.com/dego905/Cam
This script exploits CVE-2018-9995, an information disclosure vulnerability in DVR devices. It retrieves a list of users, including usernames, passwords, and roles, by sending a crafted HTTP request to the device's endpoint.
Classification
Working Poc 90%
Target:
DVR devices (specific models unknown)
No auth needed
Prerequisites:
Network access to the target DVR device
nomisec
WORKING POC
by arminarab1999 · remote
https://github.com/arminarab1999/CVE-2018-9995
This exploit PoC targets CVE-2018-9995, an information disclosure vulnerability in DVR devices. It retrieves admin credentials by sending a crafted HTTP request to the vulnerable endpoint.
Classification
Working Poc 90%
Target:
DVR devices (e.g., TVT, HIKVISION, and others)
No auth needed
Prerequisites:
Network access to the vulnerable device · Device must be exposed on the specified port
nomisec
WORKING POC
by LeQuocKhanh2K · remote-auth
https://github.com/LeQuocKhanh2K/Tool_Exploit_Password_Camera_CVE-2018-9995
This PoC exploits CVE-2018-9995, an authentication bypass vulnerability in DVR devices, to retrieve user credentials via an unauthenticated HTTP request to the `/device.rsp?opt=user&cmd=list` endpoint. The script parses the JSON response to extract usernames, passwords, and role IDs.
Classification
Working Poc 95%
Target:
DVR devices (various vendors, e.g., TVT, HVR, and others)
No auth needed
Prerequisites:
Network access to the vulnerable DVR device · Device exposed to the internet or local network
nomisec
WORKING POC
by dearpan · remote
https://github.com/dearpan/cve-2018-9995
This PoC exploits CVE-2018-9995, an authentication bypass vulnerability in DVR devices, by sending a crafted request with a modified 'Cookie: uid=admin' header to retrieve plaintext administrator credentials.
Classification
Working Poc 90%
Target:
DVR devices (specific models not listed)
No auth needed
Prerequisites:
Network access to the target DVR device · DVR device with the vulnerability exposed
nomisec
WORKING POC
by likaifeng0 · remote-auth
https://github.com/likaifeng0/CVE-2018-9995_dvr_credentials-dev_tool
This repository contains a Python script that exploits CVE-2018-9995, an information disclosure vulnerability in various DVR devices. The exploit retrieves user credentials by sending a crafted HTTP request to the vulnerable endpoint.
Classification
Working Poc 100%
Target:
Multiple DVR vendors (Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, etc.)
No auth needed
Prerequisites:
Network access to the vulnerable DVR device · Port 80 or custom port exposed
nomisec
WORKING POC
by ABIZCHI · remote
https://github.com/ABIZCHI/CVE-2018-9995_dvr_credentials
This repository contains a Python script that exploits CVE-2018-9995, an information disclosure vulnerability in various DVR devices. The exploit retrieves user credentials by sending a crafted HTTP request to the vulnerable endpoint.
Classification
Working Poc 95%
Target:
Multiple DVR vendors (Novo, CeNova, QSee, etc.)
No auth needed
Prerequisites:
Network access to the vulnerable DVR device
nomisec
WORKING POC
by TateYdq · poc
https://github.com/TateYdq/CVE-2018-9995-ModifiedByGwolfs
This repository contains a Python-based exploit for CVE-2018-9995, which targets DVR devices to extract credentials via an unauthenticated API endpoint. It includes two methods: one using Metasploit for Shodan queries and another using the Shodan API directly.
Classification
Working Poc 95%
Target:
DVR devices (e.g., Night OWL, XVR Login)
No auth needed
Prerequisites:
Shodan API key · Internet access to target devices
vulncheck_xdb
WORKING POC
remote
https://github.com/threat9/routersploit
This repository contains the RouterSploit framework, which includes exploit modules for embedded devices, including a module for CVE-2018-9995. The framework is designed for penetration testing and includes functional exploit code.
Classification
Working Poc 90%
Target:
DVR devices (specifically those vulnerable to CVE-2018-9995)
No auth needed
Prerequisites:
Network access to the target device · Python 3.6+ environment