exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Axesstel MV 410R Bypass / XSS

Axesstel MV 410R Bypass / XSS
Posted Jul 3, 2009
Authored by Filip Palian

The Axesstel MV 410R protects from malicious input by leveraging javascript, allowing an attacker to bypass all of this easily. The device is also susceptible to permanent cross site scripting vulnerabilities.

tags | exploit, javascript, vulnerability, xss, bypass
SHA-256 | 1a88d38ba784963b4eb593ef3e74f8894da4cf2c1c216b8940603ecd94a82417

Axesstel MV 410R Bypass / XSS

Change Mirror Download
Multiple Flaws in Axesstel MV 410R

by Filip Palian <filip (dot) palian (at) pjwstk (dot) edu (dot) pl

Description:
Axesstel MV 410R is a device offered by the two leading polish telecom
operators Orange and Polish Telecom to provide broadband Internet in
CDMA technology and it's already widely in use.

Overview:
Axesstel MV 410R firmware and its default configuration has many flaws,
which allows remote unauthorized access to device and the internal
network behind it.

#1 Access from the Internet to device enabled by default
Anyone is able to automatically detect devices, which are online and
conduct the attack. It's simplified even more as the oparator IP address
space is reserved for the services using this device.

#2 No HTTPS support for the web interface
Communication to the web interface can be sniffed by the attacker.

#3 System doesn't force administrator to change default password upon
first login
Many administrators leave it unchanged.

#4 Brute-force attack on admin account
Login attempts are not limited at all.

#5 Denial of Service
It's trivial to conduct a successful SYN flood attack from WAN and LAN.

#6 Wi-Fi encryption is disabled by default
Communication in the LAN can be sniffed by the attacker.
#7 SSID broadcast is enabled by default
Anyone can connect to the LAN without any problems.

#8 Input data validation
Validation in the web interface is realised by the JavaScript. Disabling
it in the browser allows for inputing malicious content.

#9 Executing CGI scripts via GET method
It is possible to pass parameters directly to the CGI scripts via GET
method. It bypasses JavaScript validation and simplifies the attack. For
example execution of
"http://192.168.0.1/cgi-bin/sysconf.cgi?RESTORE=RESTORE" (user
confirmation not needed) will reset device to default configuration.

#10 Permanent XSS
It's possible to plant permanent XSS in the web interface using
"http://192.168.0.1/cgi-bin/sysconf.cgi" script.

#11 Automatic redirection
Some scripts do the automatic redirection after execution. This feature
may be used to hide for example a CSRF attack. evilsite.com leads to
"http://192.168.0.1/cgi-bin/wireless.cgi" where script is executed and
it autoredirects back to evilsite.com.

Status:
At the moment no fixes were provided by the vendor. As a workaround
administrator should:
#1 restrict access to device only from LAN
#2 change the default administrator password (still can be sniffed in LAN)
#3 enable Wi-Fi encryption
#4 turn on clients MAC addresses filtering
#5 turn off SSID broadcasting

Disclousure timeline:
11 V 2009: Detailed information with examples and PoCs sent to vendor
(cert@telekomunikacja.pl).
12 V 2009: Initial vendor response.
19 V 2009: Question about the status sent to the vendor.
19 V 2009: No reasonable response from the vendor.
9 VI 2009: Question about the status sent to the vendor.
No response.
16 VI 2009: Notification that bulletin will be released send to the vendor.
17 VI 2009: No reasonable response from the vendor.
19 VI 2009: Last notification that bulletin will be released send to the
vendor.
No response.
23 VI 2009: Last notification that bulletin will be released send to the
vendor.
No response: "<cert@telekomunikacja.pl>: host
mailin.tpsa.pl[212.160.172.68] said: 451 Unable
to contact LDAP".
25 VI 2009: Last and final notification that bulletin will be released
send to the vendor.
No response.
02 VII 2009: Security bulletin released.
Response: ?

Rationale:
The vendor hasn't responded neither responsibly nor reasonably within 34
working days. The bulletin was released in hope that users will be able
to protect themselves against these serious threats before vendor will
realese fixes and before the bad guys will reach them first.

Links:
* http://orange.pl/
* http://tp.pl/
* http://www.axesstel.com/


Best regards,
Filip Palian
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close