🔐 CVE Alert

CVE-2024-13985

UNKNOWN 0.0

Dahua EIMS capture_handle.action RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A command injection vulnerability in Dahua EIMS versions prior to 2240008 allows unauthenticated remote attackers to execute arbitrary system commands via the capture_handle.action interface. The flaw stems from improper input validation in the captureCommand parameter, which is processed without sanitization or authentication. By sending crafted HTTP requests, attackers can inject OS-level commands that are executed on the server, leading to full system compromise. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-04-06 UTC.

CWE CWE-78
Vendor zhejiang dahua technology co., ltd.
Product eims
Published Aug 27, 2025
Last Updated May 15, 2026
Stay Ahead of the Next One

Get instant alerts for zhejiang dahua technology co., ltd. eims

Be the first to know when new unknown vulnerabilities affecting zhejiang dahua technology co., ltd. eims are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Zhejiang Dahua Technology Co., Ltd. / EIMS
0 < 2240008

References

NVD ↗ CVE.org ↗ EPSS Data ↗
support.dahuatech.com: https://support.dahuatech.com/bulletin/info?IsDpValue=APKncD%2FBd6zIq4O2BUpuhjg6hGbLYAQKuf5hnmPaK9M%3D cn-sec.com: https://cn-sec.com/archives/2554372.html blog.csdn.net: https://blog.csdn.net/weixin_43567873/article/details/136636198 github.com: https://github.com/ahisec/nuclei-tps/blob/main/http/vulnerabilities/dahua/dahua-eims-capture-handle-rce.yaml s4e.io: https://s4e.io/tools/dahua-eims-remote-code-execution pentest-tools.com: https://pentest-tools.com/vulnerabilities-exploits/dahua-eims-remote-command-execution_23961 cnvd.org.cn: https://www.cnvd.org.cn/flaw/show/CNVD-2024-17054 vulncheck.com: https://www.vulncheck.com/advisories/dahua-eims-rce

Credits

Maodaner Security