Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-30973 PoC — V-SOL G/EPON ONU HG323AC-B 安全漏洞

Source
Associated Vulnerability
Title:V-SOL G/EPON ONU HG323AC-B 安全漏洞 (CVE-2024-30973)
Description:V-SOL G/EPON ONU HG323AC-B是中国芯德科技(V-SOL)公司的一款双频 EasyMesh 路由器。 V-SOL G/EPON ONU HG323AC-B V2.0.08-210715版本存在安全漏洞。攻击者利用该漏洞可以执行任意代码并通过向 /boaform/getASPdata/formFirewall、/boaform/getASPdata/formAcc 特制的 POST 请求获取敏感信息。
Description
 POC VIDEO -  https://youtu.be/hNzmkJj-ImM?si=NF0yoSL578rNy7wN
Readme
# CVE-2024-30973 - V-SOL (G/EPON ONU - HG323AC-B)

# Description Item: 
```
Item: G/EPON ONU
Specification: HG323AC-B
Device model      XPON+2GE+1POTS+2WIFI+USB
Device SN   70B64F-1234570B64F0C2C0C
Hardware Version  V1.0
Firmware Version  V2.0.08-210715
PON S/N     GPON000C2C0C
```

## Vulnerability Type:
Incorrect Access Control

## Description Vulnerability:
To exploit the vulnerability, it is necessary to be authenticated with a low-privileged user, as it will be possible to execute administrator functions (Disable firewall and enable SSH or Telnet,etc).
After obtaining credentials, it will be necessary to retrieve the token mask of your current user by accessing the directory `http://IP/boaform/getASPdata/FMask.`

With the valid token, you can assemble a POST request to disable the firewall with the token of your user that does not have this permission. The directory to disable the firewall is `/boaform/getASPdata/formFirewall` with the parameters `FirewallLevel=0&DosEnable=0&csrfMask=USER ID`.
As a result, the application will respond with a SUCCESS.

With the firewall disabled, you can enable SSH through another POST request in the directory `/boaform/getASPdata/formAcc` - with the parameter `l_ssh SSH` equals to 1
This way, you can disable the firewall, enable SSH, and log in with your user through SSH.
The application does not handle user correctly.


## Impact Vulnerability:
The Vulnerability allows a non priviliged user disable all of the firewall rules, open any avalible service (SSH, TELNET, FTP) and connect to it, causing RCE through SSH. Only do it against infrastructure for which you have recieved permission to test.

### POC VIDEO -  https://youtu.be/hNzmkJj-ImM?si=HXTD3X0lMlA88AzH

### See Also:
 - [V-SOL G/EPON HG323AC-B](https://www.vsolcn.com/product/2ge-1pots-wifi5-1usb-mesh-onu-hg323acb)
File Snapshot

[4.0K] /data/pocs/a1176a12d6d99cdee92d99c1fd5b23dfbc4b7c2b └── [1.8K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.