Smart Park Management - RCE (CVE-2023-3836)
78Exploiting IPs reported
A vulnerability classified as critical was found in Dahua Smart Park Management up to 20230713. This vulnerability affects unknown code of the file /emap/devicePoint_addImgIco?hasSubsystem=true. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CrowdSec analysis
CVE-2023-3836 is a vulnerability in Dahua Smart Park Management that can allow remote attackers to upload arbitrary files, potentially leading to full compromise of the system.
CrowdSec has been tracking this vulnerability and its exploits since 6th of June 2025.
Data from the CrowdSec community indicates that exploitation of CVE-2023-3836 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. Telemetry from the CrowdSec network also shows that exploitation activity for CVE-2023-3836 remains steady week-over-week. Attack volumes are consistent with long-term trends, indicating sustained interest from threat actors. CVE-2023-3836 continues to be an active part of the threat landscape and will likely remain this way for the forseeable future.
Observed exploitation attempts target URLs beginning with /emap/devicepoint_addimgico
and containing indicators related to subsystem parameters.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.