This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: MBS devices have a critical flaw in `wwwupload.cgi`. <br>π₯ **Consequences**: Attackers can upload and execute **arbitrary data**. This leads to **High Integrity** and **High Availability** impact.β¦
π¦ **Affected Products**: <br>1. MBS UBR-01 Mk II <br>2. MBS UBR-02 <br>3. MBS UBR-LON <br>π **Vendor**: MBS (German company). These are remote base stations & industrial comms interfaces.
Q4What can hackers do? (Privileges/Data)
π **Hacker Actions**: <br>β’ Upload **any file** (malware, scripts). <br>β’ **Apply/Execute** that data on the device. <br>β’ Gain full control over the remote base station.β¦
π **Threshold**: **LOW**. <br>β’ **Auth**: None required (PR:N). <br>β’ **Access**: Network (AV:N). <br>β’ **Complexity**: Low (AC:L). <br>β’ **UI**: None needed (UI:N). <br>Anyone on the network can exploit this easily!
Q6Is there a public Exp? (PoC/Wild Exploitation)
π΅οΈ **Public Exploit**: **No**. <br>The `pocs` field is empty. No public Proof-of-Concept or wild exploitation code is currently available. However, the CVSS score suggests it is trivial to write one.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Identify if you use MBS UBR-01 Mk II, UBR-02, or UBR-LON. <br>2. Scan for the `wwwupload.cgi` endpoint. <br>3. Test if you can POST to it without authentication.β¦
π₯ **Urgency**: **CRITICAL**. <br>β’ CVSS Score: **High** (H/I, H/A). <br>β’ No Auth Required. <br>β’ Industrial Impact. <br>π **Action**: Patch immediately or isolate from the network. Do not ignore this!