Headline
Sielco Radio Link 2.06 Cookie Brute Force
Sielco Radio Link version 2.06 suffers from a cookie brute forcing vulnerability that can allow for session hijacking.
Sielco Radio Link 2.06 'id' Cookie Brute Force Session HijackingVendor: Sielco S.r.lProduct web page: https://www.sielco.orgAffected version: 2.06 (RTX19) 2.05 (RTX19) 2.00 (EXC19) 1.60 (RTX19) 1.59 (RTX19) 1.55 (EXC19)Summary: Sielco develops and produces radio links for alltransmission and reception needs, thanks to innovative unitsand excellent performances, accompanied by a high reliabilityand low consumption.Desc: The Cookie session ID 'id' is of an insufficient length andcan be exploited by brute force, which may allow a remote attackerto obtain a valid session, bypass authentication and manipulatethe transmitter.Tested on: lwIP/2.1.1 Web/2.9.3Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscienceAdvisory ID: ZSL-2023-5762Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5762.php26.01.2023--# Session values (len=5)Cookie: id=42331Cookie: id=28903Cookie: id=+5581Cookie: id=+9002......