CVE-2021-36260
CRITICAL KEV NUCLEIHikvision IP Camera Unauthenticated Command Injection
Title source: metasploitDescription
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
Exploits (17)
nomisec
WORKING POC
19 stars
by TaroballzChen · remote
https://github.com/TaroballzChen/CVE-2021-36260-metasploit
nomisec
WORKING POC
2 stars
by yanxinwu946 · remote
https://github.com/yanxinwu946/hikvision-unauthenticated-rce-cve-2021-36260
metasploit
WORKING POC
EXCELLENT
by Watchful_IP, bashis, jbaines-r7 · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/hikvision_cve_2021_36260_blind.rb
Nuclei Templates (1)
Hikvision IP camera/NVR - Remote Command Execution
CRITICALby pdteam,gy741,johnk3r
Shodan:
http.favicon.hash:999357577
FOFA:
icon_hash=999357577
References (6)
Scores
CVSS v3
9.8
EPSS
0.9444
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-01-10
VulnCheck KEV
2021-12-06
InTheWild.io
2021-12-09
ENISA EUVD
EUVD-2021-22880
CWE
CWE-78
Status
published
Products (50)
hikvision/ds-2cd2021g1-i\(w\)_firmware
hikvision/ds-2cd2023g2-i\(u\)_firmware
hikvision/ds-2cd2026g2-iu\/sl_firmware
hikvision/ds-2cd2027g2-l\(u\)_firmware
hikvision/ds-2cd2027g2-lu\/sl_firmware
hikvision/ds-2cd2043g2-i\(u\)_firmware
hikvision/ds-2cd2046g2-iu\/sl_firmware
hikvision/ds-2cd2047g2-l\(u\)_firmware
hikvision/ds-2cd2063g2-i\(u\)_firmware
hikvision/ds-2cd2066g2-i\(u\)_firmware
... and 40 more
Published
Sep 22, 2021
KEV Added
Jan 10, 2022
Tracked Since
Feb 18, 2026