Security
Headlines
HeadlinesLatestCVEs

Source

Zero Science Lab

Anevia Flamingo XL 3.2.9 (login) Remote Root Jailbreak

Once the admin establishes a secure shell session, she gets dropped into a sandboxed environment using the login binary that allows specific set of commands. One of those commands that can be exploited to escape the jailed shell is traceroute. A remote attacker can breakout of the restricted environment and have full root access to the device.

Zero Science Lab
#vulnerability#web#linux#apache#git#php#acer#ssl
Anevia Flamingo XL 3.6.20 Authenticated Root Remote Code Execution

The affected device suffers from authenticated remote code execution vulnerability. A remote attacker can exploit this issue and execute arbitrary system commands granting her system access with root privileges. Also, the application suffers from Insufficient Session Expiration vulnerability.

Screen SFT DAB 600/C Authentication Bypass Erase Account Exploit

The application suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

Screen SFT DAB 600/C Authentication Bypass Password Change Exploit

The application suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

Screen SFT DAB 600/C Authentication Bypass Reset Board Config Exploit

The application suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

Screen SFT DAB 600/C Authentication Bypass Account Creation Exploit

The application suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

Screen SFT DAB 600/C Unauthenticated Information Disclosure (userManager.cgx)

Screen is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information including usernames and source IP addresses.

Screen SFT DAB 600/C Authentication Bypass Admin Password Change Exploit

This exploit circumvents the control and requirement of admin's old password and directly changes the password.

Sielco PolyEco Digital FM Transmitter 2.0.6 Authorization Bypass Factory Reset

Improper access control occurs when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources behind protected pages.