ZBL EPON ONU Broadband Router 1.0 Remote Privilege Escalation Exploit
Title: ZBL EPON ONU Broadband Router 1.0 Remote Privilege Escalation Exploit
Advisory ID: ZSL-2021-5647
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 01.04.2021
W&D Corporation (WAD TECHNOLOGY (THAILAND)) - http://www.wd-thailand.com
Software model: HG104B-ZG-E / EONU-7114 / ZBL5932C CATV+PON Triple CPE
EONU Hardware Version V3.0
Software: V2.46.02P6T5S
Main Chip: RTL9607
Master Controller, Copyright (c) R&D
[01.02.2021] Contact with the vendor.
[01.04.2021] No response from the vendor.
[01.04.2021] Public security advisory released.
[2] https://www.exploit-db.com/exploits/49737
[3] https://cxsecurity.com/issue/WLB-2021040010
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/199302
[02.04.2021] - Added reference [1], [2] and [3]
[06.04.2021] - Added reference [4]
Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2021-5647
Type: Local/Remote
Impact: Privilege Escalation
Risk: (4/5)
Release Date: 01.04.2021
Summary
EONU-x GEPON ONU layer-3 home gateway/CPE broadband router.Description
The application suffers from a privilege escalation vulnerability. The limited administrative user (admin:admin) can elevate his/her privileges by sending a HTTP GET request to the configuration backup endpoint or the password page and disclose the http super user password. Once authenticated as super, an attacker will be granted access to additional and privileged functionalities.Vendor
Zhejiang BC&TV Technology Co., Ltd. (ZBL) - http://www.zblchina.comW&D Corporation (WAD TECHNOLOGY (THAILAND)) - http://www.wd-thailand.com
Affected Version
Firmwre: V100R001Software model: HG104B-ZG-E / EONU-7114 / ZBL5932C CATV+PON Triple CPE
EONU Hardware Version V3.0
Software: V2.46.02P6T5S
Main Chip: RTL9607
Master Controller, Copyright (c) R&D
Tested On
GoAhead-Webs/2.5.0 PeerSec-MatrixSSL/3.1.3-OPENVendor Status
[31.01.2021] Vulnerability discovered.[01.02.2021] Contact with the vendor.
[01.04.2021] No response from the vendor.
[01.04.2021] Public security advisory released.
PoC
zbl_router_privs.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://packetstormsecurity.com/files/162065/[2] https://www.exploit-db.com/exploits/49737
[3] https://cxsecurity.com/issue/WLB-2021040010
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/199302
Changelog
[01.04.2021] - Initial release[02.04.2021] - Added reference [1], [2] and [3]
[06.04.2021] - Added reference [4]
Contact
Zero Science LabWeb: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk