Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-13985
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-27 Aug, 2025 | 21:23
Updated At-28 Aug, 2025 | 19:49
Rejected At-
▼CVE Numbering Authority (CNA)
Dahua EIMS capture_handle.action RCE

A command injection vulnerability in Dahua EIMS versions prior to 2240008 allows unauthenticated remote attackers to execute arbitrary system commands via the capture_handle.action interface. The flaw stems from improper input validation in the captureCommand parameter, which is processed without sanitization or authentication. By sending crafted HTTP requests, attackers can inject OS-level commands that are executed on the server, leading to full system compromise. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-04-06 UTC.

Affected Products
Vendor
Zhejiang Dahua Technology Co., Ltd.
Product
EIMS
Modules
  • capture_handle.action interface
Default Status
unaffected
Versions
Affected
  • From * before 2240008 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Metrics
VersionBase scoreBase severityVector
4.010.0CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-88CAPEC-88 OS Command Injection
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Maodaner Security
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.dahuatech.com/bulletin/info?IsDpValue=APKncD%2FBd6zIq4O2BUpuhjg6hGbLYAQKuf5hnmPaK9M%3D
vendor-advisory
https://cn-sec.com/archives/2554372.html
technical-description
exploit
https://blog.csdn.net/weixin_43567873/article/details/136636198
technical-description
exploit
https://github.com/ahisec/nuclei-tps/blob/main/http/vulnerabilities/dahua/dahua-eims-capture-handle-rce.yaml
technical-description
exploit
https://s4e.io/tools/dahua-eims-remote-code-execution
third-party-advisory
https://pentest-tools.com/vulnerabilities-exploits/dahua-eims-remote-command-execution_23961
third-party-advisory
https://www.cnvd.org.cn/flaw/show/CNVD-2024-17054
third-party-advisory
https://www.vulncheck.com/advisories/dahua-eims-rce
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found