Security
Headlines
HeadlinesLatestCVEs

Source

Zero Science Lab

ABB Cylon Aspect 3.07.02 (downloadDb.php) Authenticated File Disclosure

The building management system suffers from an authenticated arbitrary file disclosure vulnerability. Input passed through the 'file' GET parameter through the 'downloadDb.php' script is not properly verified before being used to download database files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.

Zero Science Lab
#vulnerability#php#perl#auth
ABB Cylon Aspect 3.07.01 (config.inc.php) Hard-coded Credentials in phpMyAdmin

The ABB BMS/BAS controller is operating with default and hard-coded credentials contained in install package while exposed to the Internet.

ABB Cylon Aspect 3.07.00 (networkDiagAjax.php) Remote Code Execution

The ABB BMS/BAS controller suffers from an unauthenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the 'host' HTTP GET parameter called by networkDiagAjax.php script.

ABB Cylon Aspect 3.08.01 (bigUpload.php) Remote Code Execution

The ABB BMS/BAS controller suffers from a remote code execution vulnerability. The vulnerable uploadFile() function in bigUpload.php improperly reads raw POST data using the php://input wrapper without sufficient validation. This data is passed to the fwrite() function, allowing arbitrary file writes. Combined with an improper sanitization of file paths, this leads to directory traversal, allowing an attacker to upload malicious files to arbitrary locations. Once a malicious file is written to an executable directory, an authenticated attacker can trigger the file to execute code and gain unauthorized access to the building controller.

ABB Cylon Aspect 3.08.01 (databaseFileDelete.php) Arbitrary File Delete

The BMS/BAS controller suffers from an arbitrary file deletion vulnerability. Input passed to the 'file' parameter in 'databasefiledelete.php' is not properly sanitised before being used to delete files. This can be exploited by an unauthenticated attacker to delete files with the permissions of the web server using directory traversal sequences passed within the affected POST parameter.

Akuvox Smart Intercom/Doorphone Unauthenticated Stream Disclosure

The application suffers from an unauthenticated live stream disclosure when requesting video.cgi endpoint on port 8080.

Deep Sea Electronics DSE855 Remote Authentication Bypass

The device is vulnerable to configuration disclosure when direct object reference is made to the Backup.bin file using an HTTP GET request. This will enable an attacker to disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.

Aquatronica Control System 5.1.6 Passwords Leak Vulnerability

The device suffers from an unauthenticated device configuration and client-side hidden functionality disclosure.

Elber Wayber Analog/Digital Audio STL 4.00 Device Config

The device suffers from an unauthenticated device configuration and client-side hidden functionality disclosure.

Elber Wayber Analog/Digital Audio STL 4.00 Authentication Bypass

The device suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality. The issue allows attackers to bypass authentication by manipulating the set_pwd endpoint that enables them to overwrite the password of any user within the system. This grants unauthorized and administrative access to protected areas of the application compromising the device's system security.