Advertisement






DIGISOL DG-HR1400 1.00.02 Privilege Escalation

CVE Category Price Severity
CVE-2017-6896 CWE-0 N/A High
Author Risk Exploitation Type Date
Unknown High Local 2017-03-21
CPE
cpe:cpe:/h:digisol:dg-hr1400:1.00.02
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017030189

Below is a copy:

DIGISOL DG-HR1400 1.00.02 Privilege EscalationTitle:
======
 
Cookie based privilege escalation in DIGISOL DG-HR1400 1.00.02 wireless router.
 
CVE Details:
============
CVE-2017-6896
 
Reference:
========== 
 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6896
https://vuldb.com/sv/?id.97954
https://www.indrajithan.com/DIGISOL_router_previlage_escaltion
 
 
Credit:
======
 
Name: Indrajith.A.N
Website: https://www.indrajithan.com
 
Date:
====
 
13-03-2017
 
Vendor:
======
 
DIGISOL router is a product of Smartlink Network Systems Ltd. is one of India's leading networking company. It was established in the year 1993 to prop the Indian market in the field of Network Infrastructure.
 
Product:
=======
 
DIGISOL DG-HR1400 is a wireless Router
 
 
Product link: http://wifi.digisol.com/datasheets/DG-HR1400.pdf
 
Abstract details:
=================
 
privilege escalation vulnerability in the DIGISOL DG-HR1400 wireless router enables an attacker escalate his user privilege to an admin just by modifying the Base64encoded session cookie value 
 
Affected Version:
=============
 
<=1.00.02
 
 
Exploitation-Technique:
===================
 
Remote
 
 
Severity Rating:
===================
 
8
 
 
Proof Of Concept :
==================
 
1) Login to the router as a User where router sets the session cookie value to VVNFUg== (Base64 encode of "USER")
2) So Encode "ADMIN" to base64 and force set the session cookie value to QURNSU4= 
3) Refresh the page and you are able to escalate your USER privileges to ADMIN.
 
 
Disclosure Timeline:
======================================
Vendor Notification: 13/03/17



Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum