Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-43261 PoC — Milesight 日志信息泄露漏洞

Source
Associated Vulnerability
Title:Milesight 日志信息泄露漏洞 (CVE-2023-43261)
Description:Milesight是中国星纵物联(Milesight)公司的一个完整的人工智能视频监控解决方案。 Milesight UR5X、UR32L、UR32、UR35、UR41 、Industrial Cellular Routers v35.3.0.7 之前版本存在日志信息泄露漏洞,该漏洞源于允许攻击者访问敏感路由器组件。
Description
A critical security vulnerability has been identified in Milesight Industrial Cellular Routers, compromising the security of sensitive credentials and permitting unauthorized access. This vulnerability stems from a misconfiguration that results in directory listing being enabled on the router systems, rendering log files publicly accessible. These log files, while containing sensitive information such as admin and other user passwords (encrypted as a security measure), can be exploited by attackers via the router's web interface. The presence of a hardcoded AES secret key and initialization vector (IV) in the JavaScript code further exacerbates the situation, facilitating the decryption of these passwords. This chain of vulnerabilities allows malicious actors to gain unauthorized access to the router.
File Snapshot

id: CVE-2023-43261 info: name: Milesight Routers - Information Disclosure author: gy741 sever ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.