header-logo
Suggest Exploit
vendor:
VelotiSmart Wifi
by:
Miguel Mendez Z
9.8
CVSS
CRITICAL
Directory Traversal
Unknown
CWE
Product Name: VelotiSmart Wifi
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-2018-14064
CPE: Unknown
Other Scripts:
Tags: edb,cve,cve2018,lfi,camera,iot
CVSS Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 1, 'vendor': 'velotismart_project', 'product': 'velotismart_wifi_firmware'}
Platforms Tested: Unix
2018

Vulnerability in VelotiSmart Wifi – Directory Traversal

The vulnerability that affects the device is LFI type in the uc-http service 1.0.0. It allows obtaining information of configurations, wireless scanned networks, sensitive directories, etc. of the device.

Mitigation:

Unknown
Source

Exploit-DB raw data:

Title: Vulnerability in VelotiSmart Wifi - Directory Traversal
Date: 12-07-2018
Scope: Directory Traversal
Platforms: Unix
Author: Miguel Mendez Z
Vendor: VelotiSmart
Version: B380
CVE: CVE-2018–14064


Vulnerability description
-------------------------
- The vulnerability that affects the device is LFI type in the uc-http service 1.0.0. What allows to obtain information of configurations, wireless scanned networks, sensitive directories, etc. Of the device.

Vulnerable variable:
http://domain:80/../../etc/passwd

Exploit link:
https://github.com/s1kr10s/ExploitVelotiSmart

Poc:
https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac