{"vulnerability": "CVE-2023-6895", "sightings": [{"uuid": "21404bbc-b41f-49a4-840e-7e0348577806", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6895", "type": "seen", "source": "https://t.me/ctinow/161933", "content": "https://ift.tt/hClMY8S\nCVE-2023-6895 Exploit", "creation_timestamp": "2024-01-02T18:16:21.000000Z"}, {"uuid": "cdf240d1-ec88-44f1-8fc0-55a5c261e23a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6895", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mfn2u7ycc723", "content": "", "creation_timestamp": "2026-02-24T21:02:27.384546Z"}, {"uuid": "b86ddbbd-a5d9-42af-9538-8dde26839fe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6895", "type": "seen", "source": "https://t.me/arpsyndicate/4109", "content": "#ExploitObserverAlert\n\nPD/http/cves/2023/CVE-2023-6895\n\nDESCRIPTION: Exploit Observer has 14 entries in 6 file formats related to PD/http/cves/2023/CVE-2023-6895. Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE (HIK) version has an operating system command injection vulnerability. The vulnerability originates from the parameter jsondata[ip] in the file /php/ping.php, which can cause operating system command injection.", "creation_timestamp": "2024-03-01T19:58:51.000000Z"}, {"uuid": "4e6caffa-0e85-4a22-8f52-f0b316ef2298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6895", "type": "seen", "source": "https://t.me/ctinow/155945", "content": "https://ift.tt/wKBR9PL\nCVE-2023-6895 | Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK) /php/ping.php jsondata[ip] os command injection", "creation_timestamp": "2023-12-18T15:47:49.000000Z"}, {"uuid": "325ce993-2904-41fd-8268-d000bfe2e6b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6895", "type": "seen", "source": "https://t.me/arpsyndicate/2194", "content": "#ExploitObserverAlert\n\nCVE-2023-6895\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-6895. A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.\n\nFIRST-EPSS: 0.000460000", "creation_timestamp": "2023-12-28T05:02:32.000000Z"}, {"uuid": "72a88859-7f2d-4949-9018-b8db978921cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6895", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2523", "content": "#exploit\n1. CVE-2023-6895:\nOS Command Injection in Hikvision Intercom Broadcasting System\nhttps://github.com/FuBoLuSec/CVE-2023-6895\n\n2. CVE-2023-22527:\nRCE in Confluence Data Center/Server\nhttps://github.com/Avento/CVE-2023-22527_Confluence_RCE", "creation_timestamp": "2024-08-16T09:02:38.000000Z"}, {"uuid": "e29faa74-f04c-4ac7-b09f-e84cbcc8d962", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6895", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9806", "content": "#exploit\n1. CVE-2023-6895:\nOS Command Injection in Hikvision Intercom Broadcasting System\nhttps://github.com/FuBoLuSec/CVE-2023-6895\n\n2. CVE-2023-22527:\nRCE in Confluence Data Center/Server\nhttps://github.com/Avento/CVE-2023-22527_Confluence_RCE", "creation_timestamp": "2025-02-06T11:13:37.000000Z"}]}