TEM Opera Plus FM Family Transmitter 35.45 XSRF

Title: TEM Opera Plus FM Family Transmitter 35.45 XSRF
Advisory ID: ZSL-2023-5800
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (4/5)
Release Date: 25.10.2023
Summary
This new line of Opera plus FM Transmitters combines very high efficiency, high reliability and low energy consumption in compact solutions. They have innovative functions and features that can eliminate the costs required by additional equipment: automatic exchange of audio sources, built-in stereo encoder, integrated RDS encoder, parallel I/O card, connectivity through GSM telemetry and/or TCP IP / SNMP / SMTP Webserver.
Description
The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
Vendor
Telecomunicazioni Elettro Milano (TEM) S.r.l. - https://www.tem-italy.it
Affected Version
Software version: 35.45
Webserver version: 1.7
Tested On
Webserver
Vendor Status
[18.08.2023] Vulnerabilikty discovered.
[22.08.2023] Vendor contacted.
[05.10.2023] No response from the vendor.
[06.10.2023] Vendor contacted.
[08.10.2023] No response from the vendor.
[09.10.2023] CERT Serbia contacted.
[09.10.2023] CERT Serbia responded asking more details. Created incident ID: 355655.
[09.10.2023] Replied to CERT Serbia.
[24.10.2023] Asked CERT Serbia for status update.
[25.10.2023] No response from CERT Serbia.
[25.10.2023] Public security advisory released.
PoC
tem_csrf.html
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://cxsecurity.com/issue/WLB-2023100060
[2] https://packetstormsecurity.com/files/175373/TEM-Opera-Plus-FM-Family-Transmitter-35.45-Cross-Site-Request-Forgery.html
[3] https://www.exploit-db.com/exploits/51828
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/275731
[5] https://www.cisa.gov/news-events/ics-advisories/icsa-24-277-01
[6] https://www.cve.org/CVERecord?id=CVE-2024-41987
[7] https://nvd.nist.gov/vuln/detail/CVE-2024-41987
Changelog
[25.10.2023] - Initial release
[03.11.2023] - Added reference [1] and [2]
[28.02.2024] - Added reference [3]
[06.03.2024] - Added reference [4]
[03.10.2024] - Added reference [5], [6] and [7]
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk