CVE-2024-13985
Dahua EIMS capture_handle.action RCE
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A command injection vulnerability in Dahua EIMS versions prior to 2240008 allows unauthenticated remote attackers to execute arbitrary system commands via the capture_handle.action interface. The flaw stems from improper input validation in the captureCommand parameter, which is processed without sanitization or authentication. By sending crafted HTTP requests, attackers can inject OS-level commands that are executed on the server, leading to full system compromise. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-04-06 UTC.
| CWE | CWE-78 |
| Vendor | zhejiang dahua technology co., ltd. |
| Product | eims |
| Published | Aug 27, 2025 |
| Last Updated | May 15, 2026 |
Stay Ahead of the Next One
Get instant alerts for zhejiang dahua technology co., ltd. eims
Be the first to know when new unknown vulnerabilities affecting zhejiang dahua technology co., ltd. eims are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Zhejiang Dahua Technology Co., Ltd. / EIMS
0 < 2240008
References
support.dahuatech.com: https://support.dahuatech.com/bulletin/info?IsDpValue=APKncD%2FBd6zIq4O2BUpuhjg6hGbLYAQKuf5hnmPaK9M%3D cn-sec.com: https://cn-sec.com/archives/2554372.html blog.csdn.net: https://blog.csdn.net/weixin_43567873/article/details/136636198 github.com: https://github.com/ahisec/nuclei-tps/blob/main/http/vulnerabilities/dahua/dahua-eims-capture-handle-rce.yaml s4e.io: https://s4e.io/tools/dahua-eims-remote-code-execution pentest-tools.com: https://pentest-tools.com/vulnerabilities-exploits/dahua-eims-remote-command-execution_23961 cnvd.org.cn: https://www.cnvd.org.cn/flaw/show/CNVD-2024-17054 vulncheck.com: https://www.vulncheck.com/advisories/dahua-eims-rce
Credits
Maodaner Security