Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-13718

Опубликовано: 10 июн. 2019
Источник: nvd
CVSS3: 8
CVSS2: 6
EPSS Низкий

Описание

The HTTP API supported by Starry Station (aka Starry Router) allows brute forcing the PIN setup by the user on the device, and this allows an attacker to change the Wi-Fi settings and PIN, as well as port forward and expose any internal device's port to the Internet. It was identified that the device uses custom Python code called "rodman" that allows the mobile appication to interact with the device. The APIs that are a part of this rodman Python file allow the mobile application to interact with the device using a secret, which is a uuid4 based session identifier generated by the device the first time it is set up. However, in some cases, these APIs can also use a security code. This security code is nothing but the PIN number set by the user to interact with the device when using the touch interface on the router. This allows an attacker on the Internet to interact with the router's HTTP interface when a user navigates to the attacker's website, and brute force the credentials. Also

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:starry:s00111_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:starry:s00111:-:*:*:*:*:*:*:*

EPSS

Процентиль: 81%
0.01558
Низкий

8 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-254

Связанные уязвимости

CVSS3: 8
github
больше 3 лет назад

The HTTP API supported by Starry Station (aka Starry Router) allows brute forcing the PIN setup by the user on the device, and this allows an attacker to change the Wi-Fi settings and PIN, as well as port forward and expose any internal device's port to the Internet. It was identified that the device uses custom Python code called "rodman" that allows the mobile appication to interact with the device. The APIs that are a part of this rodman Python file allow the mobile application to interact with the device using a secret, which is a uuid4 based session identifier generated by the device the first time it is set up. However, in some cases, these APIs can also use a security code. This security code is nothing but the PIN number set by the user to interact with the device when using the touch interface on the router. This allows an attacker on the Internet to interact with the router's HTTP interface when a user navigates to the attacker's website, and brute force the credentials. A...

EPSS

Процентиль: 81%
0.01558
Низкий

8 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-254