Security
Headlines
HeadlinesLatestCVEs

Source

Zero Science Lab

Sielco PolyEco Digital FM Transmitter 2.0.6 Default Credentials

The FM transmitter uses a weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system.

Zero Science Lab
#vulnerability#web#git
Sielco PolyEco Digital FM Transmitter 2.0.6 Authentication Bypass Exploit

The application suffers from an authentication bypass and account takeover/lockout vulnerability that can be triggered by directly calling the users object and effectively modifying the password of the two constants user/role (user/admin). This can be exploited by an unauthenticated adversary by issuing a single POST request to the vulnerable endpoint and gain unauthorized access to the affected device with administrative privileges.

Sielco PolyEco Digital FM Transmitter 2.0.6 Authorization Bypass Factory Reset

Improper access control occurs when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources behind protected pages.

Sielco PolyEco Digital FM Transmitter 2.0.6 'polyeco' Session Hijacking

The Cookie 'polyeco' is of an insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication and manipulate the transmitter. The session is also visible in an HTTP GET request and there is the lack of SSL in use, allowing MitM attacks.

Sielco Radio Link 2.06 'id' Cookie Brute Force Session Hijacking

The Cookie session ID 'id' is of an insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication and manipulate the transmitter.

Sielco Radio Link 2.06 Cross-Site Request Forgery (Add Admin)

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

Sielco Radio Link 2.06 Improper Access Control Change Admin Password

The application suffers from improper access control when editing users. A user with Read permissions can manipulate users, passwords and permissions by sending a single HTTP POST request with modified parameters and edit other users' names, passwords and permissions including admin password.

Sielco Radio Link 2.06 Remote Privilege Escalation

The application suffers from a privilege escalation vulnerability. A user with Read permissions can elevate his/her privileges by sending a HTTP POST request setting the parameter 'auth1' or 'auth2' or 'auth3' to integer value '1' for Write or '2' for Admin permissions.

Sielco Analog FM Transmitter 2.12 'id' Cookie Brute Force Session Hijacking

The Cookie session ID 'id' is of an insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication and manipulate the transmitter.

Sielco Analog FM Transmitter 2.12 Cross-Site Request Forgery

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.