Subscribe via feed.
Archive for May, 2021

CommScope Ruckus IoT Controller 1.7.1.0 Unauthenticated API Endpoints

Posted by deepcore under exploit (No Respond)

Three API endpoints for the IoT Controller are accessible without authentication. Two of the endpoints result in information leakage and consumption of computing/storage resources. The third API endpoint that does not require authentication allows for a factory reset of the IoT Controller.

CommScope Ruckus IoT Controller 1.7.1.0 Hard-Coded API Keys Exposed

Posted by deepcore under exploit (No Respond)

API keys for CommScope Ruckus are included in the IoT Controller OVA image, and are exposed to attackers who mount the filesystem.

CommScope Ruckus IoT Controller 1.7.1.0 Hard-Coded System Passwords

Posted by deepcore under exploit (No Respond)

Hard-coded, system-level credentials exist on the Ruckus IoT Controller OVA image, and are exposed to attackers who mount the filesystem.

CommScope Ruckus IoT Controller 1.7.1.0 Hard-Coded Web Application Administrator Password

Posted by deepcore under exploit (No Respond)

An undocumented, administrative-level, hard-coded web application account exists in the IoT Controller OVA which cannot be changed by the customer.

CommScope Ruckus IoT Controller 1.7.1.0 Web Application Directory Traversal

Posted by deepcore under exploit (No Respond)

A Python script (web.py) for a Dockerized webservice contains a directory traversal vulnerability, which can be leveraged by an authenticated attacker to view the contents of directories on the IoT Controller.

CommScope Ruckus IoT Controller 1.7.1.0 Web Application Arbitrary Read/Write

Posted by deepcore under exploit (No Respond)

The IoT Controller web application includes a NodeJS module, node-red, which has the capability for users to read or write to local files on the IoT Controller. With the elevated privileges the web application runs as, this allowed for reading and writing to any file on the IoT Controller filesystem.

CommScope Ruckus IoT Controller 1.7.1.0 Undocumented Account

Posted by deepcore under exploit (No Respond)

An upgrade account is included in the IoT Controller OVA that provides the vendor undocumented access via Secure Copy (SCP).

http://nongwalocal.go.th/pun10.html

Posted by deepcore under defacement (No Respond)

http://nongwalocal.go.th/pun10.html notified by Anonymous_R

Tags:

http://sanhai.go.th/pun10.html

Posted by deepcore under defacement (No Respond)

http://sanhai.go.th/pun10.html notified by Anonymous_R

Tags:

http://sobkhong.go.th/pun10.html

Posted by deepcore under defacement (No Respond)

http://sobkhong.go.th/pun10.html notified by Anonymous_R

Tags: