New Vulnerability - MOTU AVB Directory Traversal

We’ve found that MOTU AVB devices contain a directory traversal vulnerability. During testing, we were able to append characters to the end of the URL and manipulate the application to display local files.

For example, when using the URL of

http://<<host>>:1280/../../../../../../../../../../../../etc/passwd

The application responds with the listing of the /etc/passwd file.

The vendor has not acknowledged this vulnerability and therefore no patch or fix exists. We recommend removing any external network access that this device may have.

Credit: James Carroll and Adam Pawloski, Secure Network Technologies, Inc.

Previous
Previous

Introduction to SILENTTRINITY - Tutorial 2020

Next
Next

A Guide to Exploiting MS17-010 With Metasploit - 2020 Edition