CVE-2023-26035

HIGH NUCLEI

ZoneMinder <1.36.33-1.37.33 - RCE

Title source: llm

Description

ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33.

Exploits (6)

nomisec WORKING POC 20 stars
by rvizx · poc
https://github.com/rvizx/CVE-2023-26035
nomisec WORKING POC 7 stars
by heapbytes · poc
https://github.com/heapbytes/CVE-2023-26035
nomisec WORKING POC 3 stars
by Yuma-Tsushima07 · poc
https://github.com/Yuma-Tsushima07/CVE-2023-26035
nomisec WORKING POC 1 stars
by 0xfalafel · poc
https://github.com/0xfalafel/zoneminder_CVE-2023-26035
nomisec WORKING POC
by m3m0o · poc
https://github.com/m3m0o/zoneminder-snapshots-rce-poc
metasploit WORKING POC EXCELLENT
by UnblvR, whotwagner · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/zoneminder_snapshots.rb

Nuclei Templates (1)

ZoneMinder Snapshots - Command Injection
CRITICALVERIFIEDby Unblvr1,whotwagner
Shodan: html:"ZM - Login" || http.html:"zm - login"
FOFA: body="zm - login"

Scores

CVSS v3 7.2
EPSS 0.5572
EPSS Percentile 98.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Details

CWE
CWE-862
Status published
Products (1)
zoneminder/zoneminder < 1.36.33
Published Feb 25, 2023
Tracked Since Feb 18, 2026