Security
Headlines
HeadlinesLatestCVEs

Headline

Sielco Radio Link 2.06 Remote Privilege Escalation

The application suffers from a privilege escalation vulnerability. A user with Read permissions can elevate his/her privileges by sending a HTTP POST request setting the parameter ‘auth1’ or ‘auth2’ or ‘auth3’ to integer value ‘1’ for Write or ‘2’ for Admin permissions.

Zero Science Lab
#vulnerability#web#auth

Title: Sielco Radio Link 2.06 Remote Privilege Escalation
Advisory ID: ZSL-2023-5759
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 30.03.2023

Summary

Sielco develops and produces radio links for all transmission and reception needs, thanks to innovative units and excellent performances, accompanied by a high reliability and low consumption.

Description

The application suffers from a privilege escalation vulnerability. A user with Read permissions can elevate his/her privileges by sending a HTTP POST request setting the parameter ‘auth1’ or ‘auth2’ or ‘auth3’ to integer value ‘1’ for Write or ‘2’ for Admin permissions.

Vendor

Sielco S.r.l - https://www.sielco.org

Affected Version

2.06 (RTX19)
2.05 (RTX19)
2.00 (EXC19)
1.60 (RTX19)
1.59 (RTX19)
1.55 (EXC19)

Tested On

lwIP/2.1.1
Web/2.9.3

Vendor Status

[26.01.2023] Vulnerability discovered.
[27.01.2023] Contact with the vendor and CSIRT Italia.
[29.03.2023] No response from the vendor.
[29.03.2023] No response from the CSIRT team.
[30.03.2023] Public security advisory released.

PoC

sielco_rl_eop.html

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

N/A

Changelog

[30.03.2023] - Initial release

Contact

Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: [email protected]

Zero Science Lab: Latest News

ABB Cylon Aspect 3.08.00 (log(Mix/Yum)Lookup.php) Off-by-One Error in Log Parsing