vendor:
Signum DVB-S/S2 IRD
by:
Not specified
6.1
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Signum DVB-S/S2 IRD
Affected Version From: 1.999 Revision 1243
Affected Version To: 1.166 Revision 550
Patch Exists: NO
Related CWE: CVE-Not assigned
CPE: h:elber:signum_dvb-s_s2_ird:1.999:1243
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/grandstream_ucm62xx_sendemail_rce, https://www.infosecmatter.com/nessus-csv-parser-and-extractor/, https://www.infosecmatter.com/nessus-plugin-library/?id=42870, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/cisco_asax_sfr_rce, https://www.infosecmatter.com/nessus-plugin-library/?id=99102, https://www.infosecmatter.com/nessus-plugin-library/?id=96186, https://www.infosecmatter.com/metasploit-module-library/?mm=post/windows/manage/dell_memory_protect, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/http/exchange_proxyshell_rce, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/local/ms16_075_reflection, https://www.infosecmatter.com/why-your-exploit-completed-but-no-session-was-created-try-these-fixes/
Platforms Tested:
Not specified
Elber Signum DVB-S/S2 IRD Authentication Bypass
The Elber Signum DVB-S/S2 IRD device is vulnerable to an authentication bypass issue that allows attackers to gain unauthorized access by manipulating the set_pwd endpoint to overwrite user passwords and access protected areas of the application.
Mitigation:
To mitigate this vulnerability, it is recommended to restrict network access to the device, apply the principle of least privilege, and regularly update the device firmware to the latest version.