Hikvision Camera Backdoor
A cybersecurity incident to occur probability is slim to none in public catering facilities. Although it is relatively easy to exploit unpatched cameras or other devices on the same network. Business owners focused on their KPIs. They invest in those things which are matters today. Most likely they have a limited budget for IT security.
I had a couple of requests to test local network security and I have seen vulnerable “Hikvision” cameras. An exploit is a publicly available and simple HTTP request. Full disclosure of this backdoor ”Access control bypass in Hikvision IP Cameras” [1].
I don’t want to spend more time on checking every I wrote the Nmap script to check the whole subnet faster [2]
git clone https://github.com/savenas/nmap-scripts
cd nmap-scripts
nmap --script=http-hikvision-backdoor.nse -p 80,443 192.168.0.1/24 -Pn --open
There is a working python exploit script is on exploit-db [3]

Reference:
#1 https://seclists.org/fulldisclosure/2017/Sep/23
#2 https://github.com/savenas/nmap-scripts
#3 https://www.exploit-db.com/exploits/44328