exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 905 RSS Feed

Files from LiquidWorm

Real NameGjoko Krstic
Email addressprivate
First Active2007-07-26
Last Active2024-02-24
View User Profile
Tosibox Key Service 3.3.0 Local Privilege Escalation / Unquoted Service Path
Posted Feb 24, 2024
Authored by LiquidWorm | Site zeroscience.mk

Tosibox Key Service versions 3.3.0 and below suffer from an unquoted search path issue impacting the service Tosibox Key Service for Windows. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system.

tags | exploit, arbitrary, local
systems | windows
SHA-256 | 7820f9f7d9af81913956c26707d4acc215ad499c129864227adf8ac1f2345e47
TELSAT marKoni FM Transmitter 1.9.5 Insecure Access Control
Posted Jan 31, 2024
Authored by LiquidWorm | Site zeroscience.mk

TELSAT marKoni FM Transmitter version 1.9.5 allows an unauthorized user to change passwords.

tags | exploit
SHA-256 | 1a66ae97399735bad2659eadafe4e686cf03efee1ac0274553f2b7dbf758023d
TELSAT marKoni FM Transmitter 1.9.5 Client-Side Access Control Bypass
Posted Jan 31, 2024
Authored by LiquidWorm | Site zeroscience.mk

TELSAT marKoni FM Transmitter version 1.9.5 implements client-side restrictions that can be bypassed by editing the HTML source page that enable administrative operations.

tags | exploit
SHA-256 | 83533dbc84d20eb18eca133e9837ec480db912786b98b95f7685d6c1337c524c
TELSAT marKoni FM Transmitter 1.9.5 Backdoor Account
Posted Jan 31, 2024
Authored by LiquidWorm | Site zeroscience.mk

TELSAT marKoni FM Transmitter version 1.9.5 has a hidden super administrative account factory that has the hardcoded password inokram25 that allows full access to the web management interface configuration.

tags | exploit, web
SHA-256 | 4ca01a27bd0ca6409f7d71dc7c9c036577b1fa85f80f0723476544a5ed69de48
TELSAT marKoni FM Transmitter 1.9.5 Root Command Injection
Posted Jan 31, 2024
Authored by LiquidWorm | Site zeroscience.mk

TELSAT marKoni FM Transmitter version 1.9.5 is susceptible to unauthenticated remote code execution with root privileges. An attacker can exploit a command injection vulnerability by manipulating the Email settings' WAN IP info service, which utilizes the wget module. This allows the attacker to gain unauthorized access to the system with administrative privileges by exploiting the url parameter in the HTTP GET request to ekafcgi.fcgi.

tags | exploit, remote, web, root, code execution
SHA-256 | 46341d10fda6afba8c75a394bb4b32d1f7ec8fe113f6eab57560a1e8d79ab38a
R Radio Network FM Transmitter 1.07 system.cgi Password Disclosure
Posted Dec 4, 2023
Authored by LiquidWorm | Site zeroscience.mk

R Radio Network FM Transmitter version 1.07 suffers from an improper access control that allows an unauthenticated actor to directly reference the system.cgi endpoint and disclose the clear-text password of the admin user allowing authentication bypass and FM station setup access.

tags | exploit, cgi
SHA-256 | 957fbcd8e2322bfb4df06832e6de97007a8bedfc7567ee79382899cdc5a7a54d
TitanNit Web Control 2.01 / Atemio 7600 Root Remote Command Execution
Posted Nov 27, 2023
Authored by LiquidWorm | Site zeroscience.mk

The Atemio AM 520 HD Full HD satellite receiver has a vulnerability that enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the getcommand query within the application, allowing the attacker to gain root access. Firmware versions 2.01 and below are affected.

tags | exploit, root
SHA-256 | 3449aff141402f4665fd423173623d011160d26c4468883c56ce200716f8753a
TEM Opera Plus FM Family Transmitter 35.45 Cross Site Request Forgery
Posted Oct 26, 2023
Authored by LiquidWorm | Site zeroscience.mk

TEM Opera Plus FM Family Transmitter version 35.45 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | a52528a06358c03567dd7250e46dc164be44ddfb510fb4bf6804baef2e55864d
TEM Opera Plus FM Family Transmitter 35.45 Remote Code Execution
Posted Oct 26, 2023
Authored by LiquidWorm | Site zeroscience.mk

TEM Opera Plus FM Family Transmitter version 35.45 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 7ade5447ba45d88833961d63cfdb8a3c4c9ce12a9bb50b6bc86aa17b24bdd65c
VIMESA VHF/FM Transmitter Blue Plus 9.7.1 Denial Of Service
Posted Oct 20, 2023
Authored by LiquidWorm | Site zeroscience.mk

VIMESA VHF/FM Transmitter Blue Plus version 9.7.1 suffers from a denial of service vulnerability. An unauthenticated attacker can issue an unauthorized HTTP GET request to the unprotected endpoint doreboot and restart the transmitter operations.

tags | exploit, web, denial of service
SHA-256 | 410445f3600c298991dca858be19f7b5d39aabcc622dfaeb5831c84c9962918b
Electrolink FM/DAB/TV Transmitter Pre-Auth MPFS Image Remote Code Execution
Posted Oct 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Electrolink FM/DAB/TV Transmitter allows access to an unprotected endpoint that allows an MPFS File System binary image upload without authentication. The MPFS2 file system module provides a light-weight read-only file system that can be stored in external EEPROM, external serial Flash, or internal Flash program memory. This file system serves as the basis for the HTTP2 web server module, but is also used by the SNMP module and is available to other applications that require basic read-only storage capabilities. This can be exploited to overwrite the flash program memory that holds the web server's main interfaces and execute arbitrary code.

tags | exploit, web, arbitrary
SHA-256 | ac5f10b56496b87847c741037481ca75bcd2e582224891a5fdf49e523b421ad3
Electrolink FM/DAB/TV Transmitter Unauthenticated Remote Denial Of Service
Posted Oct 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Electrolink FM/DAB/TV Transmitter from a denial of service scenario. An unauthenticated attacker can reset the board as well as stop the transmitter operations by sending one GET request to the command.cgi gateway.

tags | exploit, denial of service, cgi
SHA-256 | b9b0622841f3107d917cdcd1705a85c49fc9e8558ff56a20647b6b895f6e0b05
Electrolink FM/DAB/TV Transmitter SuperAdmin Hidden Functionality
Posted Oct 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Electrolink FM/DAB/TV Transmitter allows an unauthenticated attacker to bypass authentication and modify the Cookie to reveal hidden pages that allows more critical operations to the transmitter.

tags | exploit
SHA-256 | 45f211ad4dbcb54d00567ce51f651830505f6738b0f64c25cbfb2bd139946f03
Electrolink FM/DAB/TV Transmitter Vertical Privilege Escalation
Posted Oct 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Electrolink FM/DAB/TV Transmitter suffers from a privilege escalation vulnerability. An attacker can escalate his privileges by poisoning the Cookie from GUEST to ADMIN to effectively become Administrator or poisoning to ZSL to become Super Administrator.

tags | exploit
SHA-256 | e8e96f31a1023ce46974a3cca9e6ecddcb46a5d4bf193e19d0b57cba7468729f
Electrolink FM/DAB/TV Transmitter Remote Authentication Removal
Posted Oct 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Electrolink FM/DAB/TV Transmitter suffers from an unauthenticated parameter manipulation that allows an attacker to set the credentials to blank giving her access to the admin panel. It is also vulnerable to account takeover and arbitrary password change.

tags | exploit, arbitrary
SHA-256 | 3531396821530bd27b027935beb5b1f2474e4ce3397185218b36a45664af9f26
Electrolink FM/DAB/TV Transmitter (Login Cookie) Authentication Bypass
Posted Oct 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Electrolink FM/DAB/TV Transmitter suffers from an authentication bypass vulnerability affecting the Login Cookie. An attacker can set an arbitrary value except NO to the Login Cookie and have full system access.

tags | exploit, arbitrary, bypass
SHA-256 | f3b6802c80c2e4cb69f633b371d2be514c2309082ed530b0515e8aec53377715
Electrolink FM/DAB/TV Transmitter (controlloLogin.js) Credential Disclosure
Posted Oct 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Electrolink FM/DAB/TV Transmitter suffers from a disclosure of clear-text credentials in controlloLogin.js that can allow security bypass and system access.

tags | exploit
SHA-256 | 70c3b999a4b5275db8acaed179b976a817ce1f31fa0e23701824e4518bde9ded
Electrolink FM/DAB/TV Transmitter (login.htm/mail.htm) Credential Disclosure
Posted Oct 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

The Electrolink FM/DAB/TV Transmitter suffers from a disclosure of clear-text credentials in login.htm and mail.htm that can allow security bypass and system access.

tags | exploit
SHA-256 | c48f747f8c225e4d94444f4ed07ee6455c398bd62f471bedb496b0bc8746b94f
RoyalTSX 6.0.1 RTSZ File Handling Heap Memory Corruption
Posted Sep 25, 2023
Authored by LiquidWorm | Site zeroscience.mk

RoyalTSX version 6.0.1 suffers from an RTSZ file handling heap memory corruption vulnerability. The application receives SIGABRT after the RAPortCheck.createNWConnection() function is handling the SecureGatewayHost object in the RoyalTSXNativeUI. When the hostname has an array of around 1600 bytes and the Test Connection is clicked the application crashes instantly.

tags | exploit
SHA-256 | 6bddf02ee202f21877203f81e88ca57213713fa9fe71c747db9f8b293f536b4a
Tinycontrol LAN Controller 3 Remote Admin Password Change
Posted Sep 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Tinycontrol LAN Controller version 3 suffers from an insecure access control allowing an unauthenticated attacker to change accounts passwords and bypass authentication gaining panel control access.

tags | exploit
SHA-256 | b73a4ce4098f2e112550c164020040cd4883a903e72ab85a3eac9af475efe958
Tinycontrol LAN Controller 3 Remote Credential Extraction
Posted Sep 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Tinycontrol LAN Controller version 3 suffers from an issue where an unauthenticated attacker can retrieve the controller's configuration backup file and extract sensitive information that can allow him/her/them to bypass security controls and penetrate the system in its entirety.

tags | exploit
SHA-256 | 4010a70611adf3f6b1b2deae4aa257eb13cae334608ce487ca572842a346f924
Tinycontrol LAN Controller 3 Denial Of Service
Posted Sep 2, 2023
Authored by LiquidWorm | Site zeroscience.mk

Tinycontrol LAN Controller version 3 suffers from an unauthenticated remote denial of service vulnerability. An attacker can issue direct requests to the stm.cgi page to reboot and also reset factory settings on the device.

tags | exploit, remote, denial of service, cgi
SHA-256 | 9b6ba51344fefe8dd52543c161ab1ed42968403a056b495c0371ffad0323a48c
EuroTel ETL3100 Transmitter Information Disclosure
Posted Aug 9, 2023
Authored by LiquidWorm | Site zeroscience.mk

The EuroTel ETL3100 TV and FM transmitters suffer from an unauthenticated configuration and log download vulnerability. This will enable the attacker to disclose sensitive information and help him in authentication bypass, privilege escalation and full system access.

tags | exploit
SHA-256 | 16066a6818e6e4e0cbff4c06a01f3d229bdf94f93186113a922c895f6d2698ab
EuroTel ETL3100 Transmitter Authorization Bypass / Insecure Direct Object Reference
Posted Aug 9, 2023
Authored by LiquidWorm | Site zeroscience.mk

The EuroTel ETL3100 transmitter is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access the hidden resources on the system and execute privileged functionalities.

tags | exploit
SHA-256 | cc86fe1ce248afc0a0a39f2572e3ebbe5c33449e3144ca2a530416b9b690998a
EuroTel ETL3100 Transmitter Default Credentials
Posted Aug 9, 2023
Authored by LiquidWorm | Site zeroscience.mk

EuroTel ETL3100 transmitters use a weak set of default administrative credentials that can be guessed in remote password attacks and gain full control of the system.

tags | exploit, remote
SHA-256 | 01968fa2229cd900e82c526109f7fea321b1e471640bb99f50efbca8c488e208
Page 1 of 37
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close