what you don't know can hurt you

Shenzhen Skyworth RN510 Information Disclosure

Shenzhen Skyworth RN510 Information Disclosure
Posted May 4, 2021
Authored by Kaustubh G. Padwad

Shenzhen Skyworth RN510 suffers from an unauthenticated sensitive information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2021-25326
MD5 | 0b53bad554735a88788e329a6adbf84d

Shenzhen Skyworth RN510 Information Disclosure

Change Mirror Download
Overview
========

Title:- UnAuthenticated Sensitive information Discloser in RN510 Mesh
Extender.
CVE-ID :- CVE-2021-25326
Author: Kaustubh G. Padwad
Vendor: Shenzhen Skyworth Digital Technology Company
Ltd.(http://www.skyworthdigital.com/products)
Products:
1. RN510 with firmware V.3.1.0.4 (Tested and verified)
Potential
2.RN620 with respective firmware or below
3.RN410 With Respective firmwware or below.

Severity: High--Critical

Advisory ID
============
KSA-Dev-0012

About the Product:
==================

* RN510 dual-band wireless AC2100 access point delivers high-speed
access for web surfing and HD video streamings. Integrated with two
gigabit LAN ports, and a dual-band AP which supports 2x2
802.11n(300Mbps) and 4x4 802.11ac (1733Mbps) concurrently, RN510provides
a stable & reliable high speed wired and wireless connectivity for home
user and SOHO users. Utilizing state of art EasyMesh solution, two or
more RN510 units could be easily teamed upwith Skyworth ONT gateway
(e.g. GN543) and form an automatically organized network. RN510 could
support either wired line backhaul or wireless backhaul to other mesh
node. User could enjoy a wonderful zero-touch, robust and failure auto
recovery, seamless connected wireless home networking experience.
RN510 uses a system of units to achieve seamless whole-home Wi-Fi
coverage, eliminate weak signal areas once and for all. RN510 work
together to form a unified network with a single network name. Devices
automatically switch between RN510s as you move through your home for
the fastest possible speeds. A RN510 Dual-pack delivers Wi-Fi to an area
of up to 2,800 square feet. And if that’s not enough, simply add more
RN510 to the network anytime to increase coverage. RN510 provides fast
and stable connections with speeds of up to 2100 Mbps and works with
major internet service provider (ISP) and modem. Parental Controls
limits online time and block inappropriate websites according to unique
profiles created for each family member. Setup is easier than ever with
the Skywifi app there to walk you through every step.

Description:
============
An issue was discovered on Shenzhen Skyworth

Application revels the below Sensitive information by calling
http://192.168.2.1/cgi-bin/test_version.asp in without any authentication

2.4G SSID: SKYW_MESH_750
2.4G password: 12345678
5G SSID: SKYW_MESH_750
5G password: 12345678
username: admin
web_passwd: kaustubh


Additional Information
======================

[Affected Component]
IpAddr function on page /cgi-bin/app-staticIP.asp inside the boa web
server implementation.

------------------------------------------
[Attack Type]
Remote
------------------------------------------
[Impact Code execution]
true
------------------------------------------
[Impact Denial of Service]
true

------------------------------------------
[Attack Vectors]
An Authentiated attacker need to run set the cross site scripting
payload at DestIPAddress,urlitem under /cgi-bin/net-routeadd.asp and
/cgi-bin/sec-urlfilter.asp respectively in order to achive XSS.

[Vulnerability Type]
====================
CSRF, XSS

How to Reproduce: (POC):
========================

One can use below exploit

Attacker needs to run above requests in order to achive to XSRF.


Mitigation
==========

[Vendor of Product]
Shenzhen Skyworth Digital Technology Company
Ltd.(http://www.skyworthdigital.com/products)

Disclosure:
===========
19-Jan-2021:- reported this to vendor
19-Jan-2021:- Requested for CVE-ID


credits:
========
* Kaustubh Padwad
* Information Security Researcher
* kingkaustubh@me.com
* https://s3curityb3ast.github.io/
* https://twitter.com/s3curityb3ast
* http://breakthesec.com
* https://www.linkedin.com/in/kaustubhpadwad



Login or Register to add favorites

File Archive:

May 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    1 Files
  • 2
    May 2nd
    4 Files
  • 3
    May 3rd
    26 Files
  • 4
    May 4th
    17 Files
  • 5
    May 5th
    3 Files
  • 6
    May 6th
    32 Files
  • 7
    May 7th
    11 Files
  • 8
    May 8th
    2 Files
  • 9
    May 9th
    2 Files
  • 10
    May 10th
    13 Files
  • 11
    May 11th
    17 Files
  • 12
    May 12th
    22 Files
  • 13
    May 13th
    11 Files
  • 14
    May 14th
    9 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close