Security
Headlines
HeadlinesLatestCVEs

Source

Zero Science Lab

Tinycontrol LAN Controller v3 (LK3) Remote Admin Password Change

The application suffers from an insecure access control allowing an unauthenticated attacker to change accounts passwords and bypass authentication gaining panel control access.

Zero Science Lab
#vulnerability#web#auth
Tinycontrol LAN Controller v3 (LK3) Remote Denial Of Service Exploit

The controller suffers from an unauthenticated remote denial of service vulnerability. An attacker can issue direct requests to the stm.cgi page to reboot and also reset factory settings on the device.

EuroTel ETL3100 Transmitter Unauthenticated Config/Log Download Vulnerability

The TV and FM transmitter suffers from an unauthenticated configuration and log download vulnerability. This will enable the attacker to disclose sensitive information and help him in authentication bypass, privilege escalation and full system access.

EuroTel ETL3100 Transmitter Authorization Bypass (IDOR)

The application is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access the hidden resources on the system and execute privileged functionalities.

EuroTel ETL3100 Transmitter Default Credentials

The TV and FM transmitter uses a weak set of default administrative credentials that can be guessed in remote password attacks and gain full control of the system.

Ateme TITAN File 3.9 Job Callbacks SSRF File Enumeration

Authenticated Server-Side Request Forgery (SSRF) vulnerability exists in the Titan File video transcoding software. The application parses user supplied data in the job callback url GET parameter. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP/DNS/File request to an arbitrary destination. This can be used by an external attacker for example to bypass firewalls and initiate a service, file and network enumeration on the internal network through the affected application.

Anevia Flamingo XS 3.6.5 Authenticated Root Remote Code Execution

The affected device suffers from authenticated remote code execution vulnerability. A remote attacker can exploit this issue and execute arbitrary system commands granting her system access with root privileges. Also, the application suffers from Insufficient Session Expiration vulnerability.

Anevia Flamingo XL/XS 3.6.x Default/Hard-coded Credentials

The device uses a weak set of default and hard-coded administrative credentials that can be easily guessed in remote password attacks and gain full control of the system.

Anevia Flamingo XL 3.2.9 (login) Remote Root Jailbreak

Once the admin establishes a secure shell session, she gets dropped into a sandboxed environment using the login binary that allows specific set of commands. One of those commands that can be exploited to escape the jailed shell is traceroute. A remote attacker can breakout of the restricted environment and have full root access to the device.

Anevia Flamingo XL 3.6.20 Authenticated Root Remote Code Execution

The affected device suffers from authenticated remote code execution vulnerability. A remote attacker can exploit this issue and execute arbitrary system commands granting her system access with root privileges. Also, the application suffers from Insufficient Session Expiration vulnerability.