vendor:
BF-430, BF-431, BF-450M, and SEMAC
by:
sirpedrotavares
9.8
CVSS
CRITICAL
Authentication Bypass
287
CWE
Product Name: BF-430, BF-431, BF-450M, and SEMAC
Affected Version From: all firmware versions < June 2021
Affected Version To: June 2021
Patch Exists: YES
Related CWE: CVE-2021-31251
CPE: h:chiyu_technology:bf-430
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: BF-430, BF-431, BF-450M, and SEMAC
2021
CHIYU IoT Devices – ‘Telnet’ Authentication Bypass
Several IoT devices from the CHIYU Technology firm are vulnerable to a flaw that permits bypassing the telnet authentication process due to an overflow during the negotiation of the telnet protocol. Telnet authentication is bypassed by supplying a specially malformed request, and an attacker may force the remote telnet server to believe that the user has already authenticated. Several models are vulnerable, including BF-430, BF-431, BF-450M, and SEMAC with the most recent firmware versions.
Mitigation:
The vendor has released a patch to address this vulnerability. Users are advised to update their devices to the latest firmware version.