Subscribe via feed.

ADB Authorization Bypass

Posted by deepcore on July 6, 2018 – 9:42 pm

Depending on the firmware version/feature-set of the ISP deploying the ADB device, a standard user account may not have all settings enabled within the web GUI. An authenticated attacker is able to bypass those restrictions by adding a second slash in front of the forbidden entry of the path in the URL. It is possible to access forbidden entries within the first layer of the web GUI, any further subsequent layers/paths (sub menus) were not possible to access during testing but further exploitation can’t be ruled out entirely. Versions affected include ADB P.RG AV4202N, DV2210, VV2220, and VV5522.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.