CVE-2024-13985
CRITICAL EXPLOITEDDahua EIMS <2240008 - Command Injection
Title source: llmDescription
A command injection vulnerability in Dahua EIMS versions prior to 2240008 allows unauthenticated remote attackers to execute arbitrary system commands via the capture_handle.action interface. The flaw stems from improper input validation in the captureCommand parameter, which is processed without sanitization or authentication. By sending crafted HTTP requests, attackers can inject OS-level commands that are executed on the server, leading to full system compromise. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-04-06 UTC.
References (8)
Core 8
Core References
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/dahua-eims-rce
Various Sources vendor-advisory
https://support.dahuatech.com/bulletin/info?IsDpValue=APKncD%2FBd6zIq4O2BUpuhjg6hGbLYAQKuf5hnmPaK9M%3D
Various Sources technical-description
exploit
https://cn-sec.com/archives/2554372.html
Various Sources technical-description
exploit
https://blog.csdn.net/weixin_43567873/article/details/136636198
Various Sources technical-description
exploit
https://github.com/ahisec/nuclei-tps/blob/main/http/vulnerabilities/dahua/dahua-eims-capture-handle-rce.yaml
Various Sources third-party-advisory
https://s4e.io/tools/dahua-eims-remote-code-execution
Various Sources third-party-advisory
https://pentest-tools.com/vulnerabilities-exploits/dahua-eims-remote-command-execution_23961
Various Sources third-party-advisory
https://www.cnvd.org.cn/flaw/show/CNVD-2024-17054
Scores
CVSS v4
10.0
EPSS
0.0026
EPSS Percentile
49.3%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
VulnCheck KEV
2024-04-06
CWE
CWE-78
Status
published
Products (1)
Zhejiang Dahua Technology Co., Ltd./EIMS
< 2240008
Published
Aug 27, 2025
Tracked Since
Feb 18, 2026