lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 11 Jul 2018 14:44:40 +0200
From: Vulnerability Lab <>
Subject: Secutech DSL WR RIS 330 - Filter Bypass Vulnerability

Document Title:
Secutech DSL WR RIS 330 - Filter Bypass Vulnerability

References (Source):

Release Date:

Vulnerability Laboratory ID (VL-ID):

Common Vulnerability Scoring System:

Vulnerability Class:
Cross Site Scripting - Persistent

Current Estimated Price:
500€ - 1.000€

Product & Service Introduction:
The leader in the Venezuelan market, specializing in the development of
safety devices, communication
and networking for companies and households brand. This wireless router
works with a speed up to 300Mbps
are available in red, yellow, orange, blue, green and gray. It has three
5dBi antennas for better coverage.
Supports WEP, WPA and WPA2 also supports WDS to continuously expand its
wireless network. It complies with
IEEE 802.11n/g/b. It works with any browser and its configuration is
fast and easy using any Internet browser.

(Copy of the Homepage: )

Abstract Advisory Information:
The vulnerability laboratory core research team discovered a filter
bypass vulnerability in the official Secutech DSL Wireless Router RIS
330 web-application.

Vulnerability Disclosure Timeline:
2018-07-09:	Public Disclosure (Vulnerability Laboratory)

Discovery Status:

Affected Product(s):
Product: DSL Router - Wireless  RIS 300 5.07.52_es_FRI01

Exploitation Technique:

Severity Level:

Authentication Type:
Restricted authentication (user/moderator) - User privileges

User Interaction:
Low User Interaction

Disclosure Type:
Independent Security Research

Technical Details & Description:
A filter bypass web vulnerability has been discovered in the official
Secutech DSL Wireless Router RIS 330 web-application.
The filter bypass web vulnerability allows an attacker to evade the
controls of a restriction- or protection mechanism.

The issue allows an attacker to change the wireless passphrase to an
insecure passphrase which is forbidden by the applications
javascript engine & the current measures of minimum WPA Length less than
8 keys. The vulnerability affects the `Secutech DSL Routers`
manufactured by Secutech Inc for communications.

The remote attacker can request to add/edit via POST which changes the
wireless passphrase. Then the attacker changes the followup
parameter `wirelesspassword` to manipulate. The filter won`t allow
authenticated users to set a passphrase less than 8 characters.
The attack results in bypass f the filter and allows the attacker to
setup any passphrase (wpa needs at least 8 chars) without
secure approval. Thus issue can be exploited by automated scripts to
perform attacks against the preeshare mechanism because of
no secure request validation and restriction.

The security risk of the bypass vulnerability is estimated as medium and
the cvss (common vulnerability scoring system) count is 3.3.
Exploitation of the filter bypass vulnerability requires a privileged
web-application user account and medium user interaction.
Successful exploitation of the vulnerability results in unauthorized
access by setting a low secured passphrase key for WPA and WPA2.

Request Method(s):
[+] POST

Vulnerable Module(s):
[+] ./goform/wizardhandle

Vulnerable Parameter(s):
[+] wirelesspassword

Proof of Concept (PoC):
The filter bypass vulnerability can be exploited by local attacker with
privileged user account and without user interaction.
For security demonstration or to reproduce the vulnerability follow the
provided information and steps below to continue.

Manual steps to reproduce the vulnerability ...
1. Start the router for example in your local lan network
2. Access routers ui interface by usage of the network ip of the router
3. Login to the router and access the interface
4. Run a session tamper or any other tool to intercept the http
Setup the javascript filter , and change the wireless password into less
than 8 or even just 1234
5. Process to submit the changes via POST
6. Successfully reproduce the local vulnerability!


--- PoC Session Logs [POST] ---
POST /goform/WizardHandle HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:47.0) Gecko/20100101
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/index.asp
Cookie: language=en; admin:language=en
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 131


HTTP/1.0 302 Redirect
Server: GoAhead-Webs
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html
Location: http://localhost/notice.asp

  This document has moved to a new <a
  Please update your documents to reflect the new location.

Solution - Fix & Patch:
The vulnerability can be patched by a restriction and approval of the
affected key parameter in the POST method request.
Disallow to save any input less then 8 characters to permanently grant
the security of the customer using the mentioned hardware.

Security Risk:
The security risk of the filter bypass router vulnerability in the
password setup module is estimated as medium (CVSS 3.3).

Credits & Authors:
Lawrence Amer (Vulnerability Lab Core Research Team)
[] -

Disclaimer & Information:
The information provided in this advisory is provided as it is without
any warranty. Vulnerability Lab disclaims all warranties, either
expressed or
implied, including the warranties of merchantability and capability for
a particular purpose. Vulnerability-Lab or its suppliers are not liable
in any
case of damage, including direct, indirect, incidental, consequential
loss of business profits or special damages, even if Vulnerability Labs
or its
suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability mainly for
or consequential damages so the foregoing limitation may not apply. We
do not approve or encourage anybody to break any licenses, policies, deface
websites, hack into databases or trade with stolen data. We have no need
for criminal activities or membership requests. We do not publish
or vulnerabilities of religious-, militant- and racist-
hacker/analyst/researcher groups or individuals. We do not publish trade
researcher mails,
phone numbers, conversations or anything else to journalists,
investigative authorities or private individuals.

Domains:		-					-
Programs: 	- 	-
Feeds: 	- 			-
Social:		- 				-

Any modified copy or reproduction, including partially usages, of this
file, resources or information requires authorization from Vulnerability
Permission to electronically redistribute this alert in its unmodified
form is granted. All other rights, including the use of other media, are
reserved by
Vulnerability Lab Research Team or its suppliers. All pictures, texts,
advisories, source code, videos and other information on this website is
of vulnerability-lab team & the specific authors or managers. To record,
list, modify, use or edit our material contact (admin@) to get an ask

				    Copyright © 2018 | Vulnerability Laboratory - [Evolution
Security GmbH]™


Powered by blists - more mailing lists