CVE-2023-26035
HIGH NUCLEIZoneMinder <1.36.33-1.37.33 - RCE
Title source: llmDescription
ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33.
Exploits (6)
nomisec
WORKING POC
3 stars
by Yuma-Tsushima07 · poc
https://github.com/Yuma-Tsushima07/CVE-2023-26035
nomisec
WORKING POC
1 stars
by 0xfalafel · poc
https://github.com/0xfalafel/zoneminder_CVE-2023-26035
metasploit
WORKING POC
EXCELLENT
by UnblvR, whotwagner · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/zoneminder_snapshots.rb
Nuclei Templates (1)
ZoneMinder Snapshots - Command Injection
CRITICALVERIFIEDby Unblvr1,whotwagner
Shodan:
html:"ZM - Login" || http.html:"zm - login"
FOFA:
body="zm - login"
Scores
CVSS v3
7.2
EPSS
0.5572
EPSS Percentile
98.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Details
CWE
CWE-862
Status
published
Products (1)
zoneminder/zoneminder
< 1.36.33
Published
Feb 25, 2023
Tracked Since
Feb 18, 2026