PT-2024-27378 · Tbk · Tbk Dvr-4216 +1
Netsecfish
·
Published
2024-04-13
·
Updated
2026-01-26
·
CVE-2024-3721
CVSS v2.0
6.5
6.5
Medium
| Base vector | Vector | AV:N/AC:L/Au:S/C:P/I:P/A:P |
Name of the Vulnerable Software and Affected Versions
TBK DVR-4104 and TBK DVR-4216 versions up to 20240412
Description
A critical vulnerability exists in TBK DVR-4104 and DVR-4216 devices. This issue stems from a failure to neutralize special elements within the operating system when processing
mdb and mdc parameters through the /device.rsp?opt=sys&cmd= S O S T R E A MAX endpoint. Successful exploitation allows a remote attacker to execute arbitrary commands or cause a denial of service by sending a specially crafted POST request. This vulnerability, identified as CVE-2024-3721, has been actively exploited by a new variant of the Mirai botnet, resulting in over 50,000 infected devices globally, particularly in Russia, China, Egypt, India, Brazil, and Turkey. The botnet utilizes RC4 encryption and anti-VM techniques to evade detection. The vulnerability is a command injection flaw, where manipulation of the mdb/mdc arguments leads to operating system command injection via the /device.rsp API endpoint.Recommendations
TBK DVR-4104 versions prior to 20240412
TBK DVR-4216 versions prior to 20240412
Exploit
Fix
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-06507
CVE-2024-3721
Affected Products
Tbk Dvr-4104
Tbk Dvr-4216
References · 110
- 🔥 https://github.com/netsecfish/tbk_dvr_command_injection⭐ 7 🔗 1 · Exploit
- https://bdu.fstec.ru/vul/2025-06507 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2024-3721 · Security Note
- https://twitter.com/TweetThreatNews/status/1942583629369978962 · Twitter Post
- https://vuldb.com/?id.260573 · Note
- https://twitter.com/the_yellow_fall/status/1941313799627342236 · Twitter Post
- https://twitter.com/StopMalvertisin/status/1930935223618842714 · Twitter Post
- https://twitter.com/ET_Labs/status/1904998676449403219 · Twitter Post
- https://twitter.com/securityaffairs/status/1931998731496231336 · Twitter Post
- https://t.me/true_secator/7714 · Telegram Post
- https://twitter.com/shah_sheikh/status/1904561141751128133 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1l83zih/top_10_trending_cves_10062025 · Reddit Post
- https://twitter.com/Synapze_/status/1906194788564492661 · Twitter Post
- https://twitter.com/threatsbank/status/1935640860798128404 · Twitter Post
- https://t.me/true_secator/7514 · Telegram Post