""ET EXPLOIT Shenzhen TVT DVR/NVR/IPC WebUI RCE ADD Attempt""
SID: 2036253
Revision: 2
Class Type: attempted-admin
Metadata: created_at 2022_04_19, updated_at 2022_04_19
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "POST"
-
Value: "/editBlackAndWhiteList"
-
Value: "clientType|3d 22|WEB|22 3e|"
-
Value: "|3c|addressType|3e|ip|3c 2f|addressType|3e 3c|ip|3e|"
Within:
PCRE: "/\x3caddressType\x3eip\x3c\x2faddressType\x3e\x3cip\x3e(?:[\x60\x3b\x7c]|%60|%3b|%7c|%26|(?:[\x3c\x3e\x24]|%3c|%3e|%24)(?:\x28|%28))/P"
Special Options:
-
http_method
-
http_uri
-
http_client_body
-
http_client_body
-
fast_pattern