solarlog 500 2.8.2 incorrect access control
▸▸▸ Exploit & Vulnerability >> webapps exploit & multiple vulnerability
# Exploit Title: Solar-Log 500 2.8.2 - Incorrect Access Control # Google Dork: In Shodan search engine, the filter is ""Server: IPC@CHIP"" # Date: 2021-06-11 # Exploit Author: Luca.Chiou # Vendor Homepage: https://www.solar-log.com/en/ # Software Link: Firmware for Solar-Log https://www.solar-log.com/en/support/firmware/ # Version: Solar-Log 500 all versions prior to 2.8.2 Build 52 - 23.04.2013 # Tested on: It is a proprietary devices: https://www.solar-log.com/en/support/firmware/ # 1. Description: # The web administration server for Solar-Log 500 all versions prior to 2.8.2 Build 52 does not require authentication, # which allows arbitrary remote attackers to gain administrative privileges by connecting to the server. # As a result, the attacker can modify configuration files and change the system status. # 2. Proof of Concept: # Access the /lan.html of Solar-Log 500 without ANY authentication, # and you can get gain administrative privileges to modify configuration files and change the system status. # http://<Your Modem IP>/lan.html
Solarlog 500 2.8.2 incorrect access control Vulnerability / Exploit Source : Solarlog 500 2.8.2 incorrect access control