Security
Headlines
HeadlinesLatestCVEs

Headline

TitanNit Web Control 2.01 / Atemio 7600 Root Remote Code Execution

The vulnerability in the device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the ‘getcommand’ query within the application, allowing the attacker to gain root access.

Zero Science Lab
#vulnerability#web#linux#git#rce#auth

Title: TitanNit Web Control 2.01 / Atemio 7600 Root Remote Code Execution
Advisory ID: ZSL-2023-5801
Type: Local/Remote
Impact: System Access, DoS
Risk: (5/5)
Release Date: 25.11.2023

Summary

The Atemio AM 520 HD Full HD satellite receiver enables the reception of digital satellite programs in overwhelming image quality in both SD and HD ranges. In addition to numerous connections, the small all-rounder offers a variety of plugins that can be easily installed thanks to the large flash memory. The TitanNit Linux software used combines the advantages of the existing E2 and Neutrino systems and is therefore fast, stable and adaptable.

Description

The vulnerability in the device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the ‘getcommand’ query within the application, allowing the attacker to gain root access.

Vendor

AAF Digital HD Forum | Atelmo GmbH - http://www.aaf-digital.info | https://www.atemio.de

Affected Version

Firmware <=2.01

Tested On

GNU/Linux 2.6.32.71 (STMicroelectronics)
GNU/Linux 3.14-1.17 (armv7l)
GNU/Linux 3.14.2 (mips)
ATEMIO M46506 revision 990
Atemio 7600 HD STB
CPU STx7105 Mboard
titan web server

Vendor Status

N/A

PoC

titannit_rce.py

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

N/A

Changelog

[25.11.2023] - Initial release

Contact

Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: [email protected]

Zero Science Lab: Latest News

Akuvox Smart Intercom/Doorphone Unauthenticated Stream Disclosure