Security
Headlines
HeadlinesLatestCVEs

Headline

VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) Remote Denial Of Service

The mobile application or the affected API suffers from an SQL Injection vulnerability. Input passed to the parameters that are associated to international transfer is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and disclose sensitive information.

Zero Science Lab
#sql#vulnerability#web#ios#dos#perl#auth

Title: VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) Remote Denial Of Service
Advisory ID: ZSL-2023-5798
Type: Local/Remote
Impact: DoS
Risk: (4/5)
Release Date: 19.10.2023

Summary

The transmitter Blue Plus is designed with all the latest technologies, such as high efficiency using the latest generation LDMOS transistor and high efficiency power supplies. We used a modern interface and performance using a color display with touch screen, with easy management software and easy to use. The transmitter is equipped with all audio input including Audio IP for a complete audio interface. The VHF/FM transmitter 30-1000 is intended for the transmission of frequency modulated broadcasts in mono or stereo. It work with broadband characteristics in the VHF frequency range from 87.5-108 MHz and can be operated with any frequency in this range withoug alignment. The transmitter output power is variable between 10 and 110% of the nominal Power. It is available with different remote control ports. It can store up to six broadcast programs including program specific parameters such as frequency, RF output power, modulation type, RDS, AF level and deviation limiting. The transmitter is equipped with a LAN interface that permits the complete remote control of the transmitter operation via SNMP or Web Server.

Description

The device is suffering from a Denial of Service (DoS) vulnerability. An unauthenticated attacker can issue an unauthorized HTTP GET request to the unprotected endpoint ‘doreboot’ and restart the transmitter operations.

Vendor

Video Medios, S.A. (VIMESA) - https://www.vimesa.es

Affected Version

img:v9.7.1 Html:v2.4 RS485:v2.5

Tested On

lighttpd/1.4.32

Vendor Status

[22.07.2023] Vulnerability discovered.
[24.07.2023] Vendor contacted.
[14.10.2023] No response from the vendor.
[15.10.2023] Vendor contacted.
[18.10.2023] No response from the vendor.
[19.10.2023] Public security advisory released.

PoC

vimesa_dos.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

N/A

Changelog

[19.10.2023] - Initial release

Contact

Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: [email protected]

Zero Science Lab: Latest News

Akuvox Smart Intercom/Doorphone Unauthenticated Stream Disclosure