V-SOL GPON/EPON OLT Platform v2.03 Remote Privilege Escalation
Title: V-SOL GPON/EPON OLT Platform v2.03 Remote Privilege Escalation
Advisory ID: ZSL-2019-5538
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 26.09.2019
V2.03.54R
V2.03.52R
V2.03.49
V2.03.47
V2.03.40
V2.03.26
V2.03.24
V1.8.6
V1.4
[2] https://exchange.xforce.ibmcloud.com/vulnerabilities/167771
[3] https://cxsecurity.com/issue/WLB-2019090177
[4] https://packetstormsecurity.com/files/154632
[03.10.2019] - Added reference [1], [2], [3] and [4]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2019-5538
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 26.09.2019
Summary
GPON is currently the leading FTTH standard in broadband access technology being widely deployed by service providers around the world. GPON/EPON OLT products are 1U height 19 inch rack mount products. The features of the OLT are small, convenient, flexible, easy to deploy, high performance. It is appropriate to be deployed in compact room environment. The OLTs can be used for 'Triple-Play', VPN, IP Camera, Enterprise LAN and ICT applications.Description
The application suffers from a privilege escalation vulnerability. Normal user can elevate his/her privileges by sending a HTTP POST request setting the parameter 'user_role_mod' to integer value '1' gaining admin rights.Vendor
Guangzhou V-SOLUTION Electronic Technology Co., Ltd. - https://www.vsolcn.comAffected Version
V2.03.62R_IPv6V2.03.54R
V2.03.52R
V2.03.49
V2.03.47
V2.03.40
V2.03.26
V2.03.24
V1.8.6
V1.4
Tested On
GoAhead-WebsVendor Status
N/APoC
gpon_olt_privesc.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://www.exploit-db.com/exploits/47435[2] https://exchange.xforce.ibmcloud.com/vulnerabilities/167771
[3] https://cxsecurity.com/issue/WLB-2019090177
[4] https://packetstormsecurity.com/files/154632
Changelog
[26.09.2019] - Initial release[03.10.2019] - Added reference [1], [2], [3] and [4]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk