Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-43096 PoC — Mediatrix 4102 安全漏洞

Source
Associated Vulnerability
Title:Mediatrix 4102 安全漏洞 (CVE-2022-43096)
Description:Mediatrix 4102是Mediatrix公司的一种 VoIP 适配器。 Mediatrix 4102 v48.5.2718之前版本存在安全漏洞,该漏洞源于允许本地攻击者通过UART端口获得root访问权限。
Readme
CVE-2022-43096

CVSS v3.1 Vector: AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N (7,3)

[Description]

Mediatrix 4102 before v48.5.2718 allows local attackers to gain root
access via the UART port.

![root-seriel_edit](https://user-images.githubusercontent.com/113522001/202402928-006dd37a-f15b-41d2-9b38-c1bd5c87a36c.png)

------------------------------------------

[Vulnerability Type]

Incorrect Access Control

------------------------------------------

[Vendor of Product]

Mediatrix

------------------------------------------

[Affected Product Code Base]

Mediatrix 4102 - Before v48.5.2718

------------------------------------------

[Affected Component]

UART port

------------------------------------------

[Attack Type]

Physical

------------------------------------------

[Impact Code execution]

true

------------------------------------------

[Impact Escalation of Privileges]

true

------------------------------------------

[Impact Information Disclosure]

true

------------------------------------------

[Reference]

Summary ID: DGW-15338

https://documentation.media5corp.com/display/MP/DGW+Security+Improvement+Notes+v48.5.2718

Product page:

https://www.m5t.com/products/mediatrix-access-devices/4100-voip-adaptors/

------------------------------------------

[Has vendor confirmed or acknowledged the vulnerability?]

true

------------------------------------------

[Discoverer]

Daniel Wong
File Snapshot

[4.0K] /data/pocs/99fc5d10d05009fb976779ae55f85b501e44f1b7 └── [1.4K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.