Back to list
Secutech DSL WR RIS 330 - Filter Bypass Vulnerability
Jul 11 2018 12:44PM
Vulnerability Lab (research vulnerability-lab com)
Secutech DSL WR RIS 330 - Filter Bypass Vulnerability
Vulnerability Laboratory ID (VL-ID):
Common Vulnerability Scoring System:
Cross Site Scripting - Persistent
Current Estimated Price:
500â?¬ - 1.000â?¬
Product & Service Introduction:
The leader in the Venezuelan market, specializing in the development of
safety devices, communication
and networking for companies and households brand. This wireless router
works with a speed up to 300Mbps
are available in red, yellow, orange, blue, green and gray. It has three
5dBi antennas for better coverage.
Supports WEP, WPA and WPA2 also supports WDS to continuously expand its
wireless network. It complies with
IEEE 802.11n/g/b. It works with any browser and its configuration is
fast and easy using any Internet browser.
(Copy of the Homepage: http://www.secutechnology.com/ris-22.html )
Abstract Advisory Information:
The vulnerability laboratory core research team discovered a filter
bypass vulnerability in the official Secutech DSL Wireless Router RIS
Vulnerability Disclosure Timeline:
2018-07-09: Public Disclosure (Vulnerability Laboratory)
Product: DSL Router - Wireless RIS 300 5.07.52_es_FRI01
Restricted authentication (user/moderator) - User privileges
Low User Interaction
Independent Security Research
Technical Details & Description:
A filter bypass web vulnerability has been discovered in the official
Secutech DSL Wireless Router RIS 330 web-application.
The filter bypass web vulnerability allows an attacker to evade the
controls of a restriction- or protection mechanism.
The issue allows an attacker to change the wireless passphrase to an
insecure passphrase which is forbidden by the applications
8 keys. The vulnerability affects the `Secutech DSL Routers`
manufactured by Secutech Inc for communications.
The remote attacker can request to add/edit via POST which changes the
wireless passphrase. Then the attacker changes the followup
parameter `wirelesspassword` to manipulate. The filter won`t allow
authenticated users to set a passphrase less than 8 characters.
The attack results in bypass f the filter and allows the attacker to
setup any passphrase (wpa needs at least 8 chars) without
secure approval. Thus issue can be exploited by automated scripts to
perform attacks against the preeshare mechanism because of
no secure request validation and restriction.
The security risk of the bypass vulnerability is estimated as medium and
the cvss (common vulnerability scoring system) count is 3.3.
Exploitation of the filter bypass vulnerability requires a privileged
web-application user account and medium user interaction.
Successful exploitation of the vulnerability results in unauthorized
access by setting a low secured passphrase key for WPA and WPA2.
Proof of Concept (PoC):
The filter bypass vulnerability can be exploited by local attacker with
privileged user account and without user interaction.
For security demonstration or to reproduce the vulnerability follow the
provided information and steps below to continue.
Manual steps to reproduce the vulnerability ...
1. Start the router for example in your local lan network
2. Access routers ui interface by usage of the network ip of the router
3. Login to the router and access the interface
4. Run a session tamper or any other tool to intercept the http
than 8 or even just 1234
5. Process to submit the changes via POST
6. Successfully reproduce the local vulnerability!
--- PoC Session Logs [POST] ---
POST /goform/WizardHandle HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:47.0) Gecko/20100101
Accept-Encoding: gzip, deflate
Cookie: language=en; admin:language=en
HTTP/1.0 302 Redirect
This document has moved to a new <a
Please update your documents to reflect the new location.
Solution - Fix & Patch:
The vulnerability can be patched by a restriction and approval of the
affected key parameter in the POST method request.
Disallow to save any input less then 8 characters to permanently grant
the security of the customer using the mentioned hardware.
The security risk of the filter bypass router vulnerability in the
password setup module is estimated as medium (CVSS 3.3).
Credits & Authors:
Lawrence Amer (Vulnerability Lab Core Research Team)
[zeroattck (at) gmail (dot) com [email concealed]] -
Disclaimer & Information:
The information provided in this advisory is provided as it is without
any warranty. Vulnerability Lab disclaims all warranties, either
implied, including the warranties of merchantability and capability for
a particular purpose. Vulnerability-Lab or its suppliers are not liable
case of damage, including direct, indirect, incidental, consequential
loss of business profits or special damages, even if Vulnerability Labs
suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability mainly for
or consequential damages so the foregoing limitation may not apply. We
do not approve or encourage anybody to break any licenses, policies, deface
websites, hack into databases or trade with stolen data. We have no need
for criminal activities or membership requests. We do not publish
or vulnerabilities of religious-, militant- and racist-
hacker/analyst/researcher groups or individuals. We do not publish trade
phone numbers, conversations or anything else to journalists,
investigative authorities or private individuals.
Domains: www.vulnerability-lab.com - www.vulnerability-db.com -
Programs: vulnerability-lab.com/submit.php -
Feeds: vulnerability-lab.com/rss/rss.php -
Social: twitter.com/vuln_lab - facebook.com/VulnerabilityLab -
Any modified copy or reproduction, including partially usages, of this
file, resources or information requires authorization from Vulnerability
Permission to electronically redistribute this alert in its unmodified
form is granted. All other rights, including the use of other media, are
Vulnerability Lab Research Team or its suppliers. All pictures, texts,
advisories, source code, videos and other information on this website is
of vulnerability-lab team & the specific authors or managers. To record,
list, modify, use or edit our material contact (admin@) to get an ask
Copyright Â© 2018 | Vulnerability Laboratory - [Evolution
VULNERABILITY LABORATORY - RESEARCH TEAM
[ reply ]
Copyright 2010, SecurityFocus