Security
Headlines
HeadlinesLatestCVEs

Source

Zero Science Lab

Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2) Remote Root Exploit

The home automation solution suffers from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'name' GET parameter in 'delsnap.pl' Perl/CGI script which is used for deleting snapshots taken from the webcam.

Zero Science Lab
#vulnerability#web#mac#linux#nodejs#js#git#c++#perl#pdf#auth
Carel pCOWeb HVAC BACnet Gateway 2.1.0 Unauthenticated Directory Traversal

The device suffers from multiple vulnerabilities including: Default Credentials, CSRF, Authenticated Stored XSS and Open Redirect.

JM-DATA ONU JF511-TV Multiple Remote Vulnerabilities

The device suffers from multiple vulnerabilities including: Default Credentials, CSRF, Authenticated Stored XSS and Open Redirect.

Schneider Electric C-Bus Automation Controller (5500SHAC) 1.10 Remote Root Exploit

The automation controller suffers from an authenticated arbitrary command execution vulnerability. An attacker can abuse the Start-up (init) script editor and exploit the 'script' POST parameter to insert malicious Lua script code and execute commands with root privileges that will grant full control of the device.

Tenda HG6 v3.3.0 Remote Command Injection Vulnerability

The application suffers from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the 'pingAddr' and 'traceAddr' HTTP POST parameters in formPing, formPing6, formTracert and formTracert6 interfaces.

USR IOT 4G LTE Industrial Cellular VPN Router 1.0.36 Remote Root Backdoor

The USR IOT industrial router is vulnerable to hard-coded credentials within its Linux distribution image. These sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the device. The 'usr' account with password 'www.usr.cn' has the highest privileges on the device. The password is also the default WLAN password.

Delta Controls enteliTOUCH 3.40.3935 Cross-Site Scripting (XSS)

Input passed to the POST parameter 'Username' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.

Delta Controls enteliTOUCH 3.40.3935 Cross-Site Request Forgery (CSRF)

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

Delta Controls enteliTOUCH 3.40.3935 Cookie User Password Disclosure

The application suffers from a cleartext transmission/storage of sensitive information in a Cookie. This allows a remote attacker to intercept the HTTP Cookie authentication credentials through a man-in-the-middle attack.

Verizon 4G LTE Network Extender Weak Credentials Algorithm

Verizon's 4G LTE Network Extender is utilising a weak default admin password generation algorithm. The password is generated using the last 4 values from device's MAC address which is disclosed on the main webUI login page to an unauthenticated attacker. The values are then concatenated with the string 'LTEFemto' resulting in something like 'LTEFemtoD080' as the default Admin password.