How to reset device password after gaining unrestricted root access via ssh (using CVE-2021-36260 exploit) ?

nowork

n3wb
Joined
Jan 8, 2022
Messages
2
Reaction score
0
Location
Japan
I am relatively new to HIKVISION IP Camera.

I have a HIKVISION network PT camera (DS-2CV2Q21FD-IW). I lost its "device" password long time ago.
With the help of CVE-2021-36260 exploit, I can gain an unrestricted root access (/bin/sh by ssh) via local network.
I can access /etc/passwd file and rewrite its content in order to change passwords of root, admin and P users if necessary.
However these changes will be reset to its firmeware configuration after the device reboots everytimes.

Anyone knows how to change a "device" password (via /bin/sh command line), and preserve the change to its firmware setting?

Thank in advance for your help.
 

bp2008

Staff member
Joined
Mar 10, 2014
Messages
12,674
Reaction score
14,020
Location
USA
I have no idea. I suggest you factory reset the camera after changing its password temporarily.

Or you could probably just use the web interface to change the passwords and that would force it to be persisted?
 

nowork

n3wb
Joined
Jan 8, 2022
Messages
2
Reaction score
0
Location
Japan
Thank for your advice. I forgot to mention that I cannot access the web GUI to login via browser. I can only access to the ssh console. The manually generated content of /etc/passwd after booting seems not to be synced with the web server. (I am not sure if this is the exact reason to why I cannot login via web interface)

Do you or anyone else have any suggestions to fix this?

Thanks
 

alastairstevenson

Staff member
Joined
Oct 28, 2014
Messages
15,952
Reaction score
6,787
Location
Scotland
I have a HIKVISION network PT camera (DS-2CV2Q21FD-IW). I lost its "device" password long time ago.
I'm not familiar with that model of camera, but the product specs suggest that it has a reset button, though it does not say where.
If you can find the reset button, press it, power on the camera and keep the button pressed for 30-40 seconds.
After that the camera should be in an 'Inactive' state.
An easy way to Activate the camera is to supply a new, strong, password using SADP.
 

CQR-View

n3wb
Joined
Oct 15, 2020
Messages
20
Reaction score
12
Location
Perth, Western Australia
It appears the Reset Button is located on the underside of the Lens Housing (if you would call it that)
Basically ................. Use the Tilt Feature and make the camera look up, then check the under carriage ....................... see pic

1642163792450.png
 

CQR-View

n3wb
Joined
Oct 15, 2020
Messages
20
Reaction score
12
Location
Perth, Western Australia
I'm not familiar with that model of camera, but the product specs suggest that it has a reset button, though it does not say where.
If you can find the reset button, press it, power on the camera and keep the button pressed for 30-40 seconds.
After that the camera should be in an 'Inactive' state.
An easy way to Activate the camera is to supply a new, strong, password using SADP.
FYI - Correction to Reset Procedure
"RESET: Hold down the button for 4 seconds when the camera is running. "
 

CQR-View

n3wb
Joined
Oct 15, 2020
Messages
20
Reaction score
12
Location
Perth, Western Australia
I am relatively new to HIKVISION IP Camera.

I have a HIKVISION network PT camera (DS-2CV2Q21FD-IW). I lost its "device" password long time ago.
With the help of CVE-2021-36260 exploit, I can gain an unrestricted root access (/bin/sh by ssh) via local network.
I can access /etc/passwd file and rewrite its content in order to change passwords of root, admin and P users if necessary.
However these changes will be reset to its firmeware configuration after the device reboots everytimes.

Anyone knows how to change a "device" password (via /bin/sh command line), and preserve the change to its firmware setting?

Thank in advance for your help.
It is highly probable that you may be experiencing difficulties in extracting the relevant data you are seeking due to the fact your Camera Model does not appear in the list of Vulnerable Camera Models in which the CVE-2021-36260 exploit exists ........................ just saying.

The following link is to the most up-to-date info I could find, which references "Version 1.2, updated list of models Dated 28/9/2021". Your Camera is not listed.
Security Notification- Command Injection Vulnerability in Some Hikvision products | Hikvision US | The world’s largest video surveillance manufacturer

Moving on, locating the documentation for this camera, the "Quick Start Guide" the Hik-Connect App is used to Set up & Configuration this Camera. Other Documentation appears to cover the IP Camera range as a Holistic approach & not for your specific Camera Model. links to all these below.

I hope this helps

Link to Quick Start Guide

Link to User Manual

Link to FAQ
 

Mike_Larry

n3wb
Joined
Nov 9, 2022
Messages
26
Reaction score
5
Location
London
Hi guys, I’ve recently purchased some Hilook/Hikvision products. Was having issues with my previous Wifi camera setup in our estate with people jamming the cameras. Having issues with my new hikvision products which has led me to believe my devices are being hacked.

Are there any tools out there which i can use to test my devices for the vulnerability. Even better still, if i was to provide the ip addresses is there anyone who can test the devices for me as im very new to this whole networking stuff. Am willing to pay for the service.

If no one is available to do this maybe they know someone who can. Would be grateful if they could pass on the contact details.

Appreciate the help. Thanks
 

trempa92

Pulling my weight
Joined
Mar 26, 2020
Messages
724
Reaction score
221
Location
Croatia,Zagreb
You may use paramReset once you gained access, Device state will run into inactive state with all your network and general configuration intact. Simply activate with new password.
 
Top