Carel pCOWeb < B1.2.1 - Credentials Disclosure

  • 作者: Luca.Chiou
    日期: 2019-05-22
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46898/
  • # Exploit Title: Carel pCOWeb - Unprotected Storage of Credentials
    # Date: 2019-04-16
    # Exploit Author: Luca.Chiou
    # Vendor Homepage: https://www.carel.com/
    # Version: Carel pCOWeb all versions prior to B1.2.1
    # Tested on: It is a proprietary devices: http://www.carel.com/product/pcoweb-card
    
    # 1. Description:
    # The devices, Carel pCOWeb, store plaintext passwords,
    # which may allow sensitive information to be read by someone with access to the device.
    
    # 2. Proof of Concept:
    # Browse the maintain user page in website:
    # http://<Your<http://%3cYour> Modem IP>/config/pw_changeusers.html
    # The user's information include Description, Username and Password.
    # In user page, we can find out that user passwords stored in plaintext.