From fca9293d1f1b8c6f4475937c562689e07396f647 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 22 Aug 2023 14:54:24 +0530 Subject: [PATCH] reference added --- http/vulnerabilities/other/hikvision-isecure-center-rce.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/http/vulnerabilities/other/hikvision-isecure-center-rce.yaml b/http/vulnerabilities/other/hikvision-isecure-center-rce.yaml index 01b59e96bc..1984f2b918 100644 --- a/http/vulnerabilities/other/hikvision-isecure-center-rce.yaml +++ b/http/vulnerabilities/other/hikvision-isecure-center-rce.yaml @@ -3,11 +3,12 @@ id: hikvision-isecure-center-rce info: name: HIKVISION iSecure Center - Remote Code Execution author: SleepingBag945 - severity: high + severity: critical description: | Hikvision's comprehensive security management platform has a Fastjson remote command execution vulnerability, which can execute system commands and obtain system permissions and sensitive data information of the target server. reference: - https://zhuanlan.zhihu.com/p/647590787 + - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/iot/HIKVISION/HIKVISION%20%E7%BB%BC%E5%90%88%E5%AE%89%E9%98%B2%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0%20applyCT%20Fastjson%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md metadata: max-request: 1 verified: true