This repository contains detailed information about zero-day vulnerabilities discovered in various systems and devices. The purpose of this repository is to document and raise awareness about critical security flaws, their impact, and potential fixes. The vulnerabilities are categorized by vendor and product for easy navigation.
The repository is organized into directories, each corresponding to a specific vendor or product. Below is an overview of the directories and their contents:
- Product: Maxiva UAXT , VAXT Transmitter
- Vulnerabilities:
- Remote Code Execution (RCE) via
/jsonendpoint. - Information Disclosure via
/logs/devcfg/endpoints. - Session Hijacking via
/logs/debug/endpoints.
- Remote Code Execution (RCE) via
- Product: ECRESO FM/DAB/TV Transmitter
- Vulnerabilities:
- Privilege Escalation via
/wscomendpoint.
- Privilege Escalation via
- Product: Transmitter Management System
- Vulnerabilities:
- Session Hijacking via exposed log files.
- Product: FM/DAB/TV Transmitter Web Management System
- Vulnerabilities:
- Credentials Disclosure via
/controlloLogin.js.
- Credentials Disclosure via
- Product: Mozart FM Transmitter
- Vulnerabilities:
- Cross-Site Scripting (XSS) via
/main0.php. - authenticated File Upload via
/patch.php. - Unauthenticated File Upload via
/upload_file.php.
- Cross-Site Scripting (XSS) via
- Product: Itel IP Stream
- Vulnerabilities:
- Broken Access Control allowing unauthenticated WebSocket connections, leading to potential unauthorized access and service disruption.
- Product: ELCA Star Transmitter Remote Control
- Vulnerabilities:
- Information Disclosure via an unprotected endpoint, leading to potential unauthorized access.
- Product: Soundcraft Ui Series (Ui12, Ui16)
- Vulnerabilities:
- Information Disclosure via an unprotected endpoint, leading to potential unauthorized access.
- Product: Nautel VX Series
- Vulnerabilities:
- Remote Code Execution via Unauthorized Firmware Modification.
- Product: Orban OPTIMOD 5950 Audio Processor
- Vulnerabilities:
- Broken Access Control via Client-Side Manipulation.
- Product: JMBroadcast JMB0150
- Vulnerabilities:
- Broken Access Control.
- Information Disclosure.
- Product: DAEnetIP4 METO
- Vulnerabilities:
- Session Hijacking via
/login_ok.htmendpoints.
- Session Hijacking via
- Product: Elber REBLE310
- Vulnerabilities:
- Session Hijacking via
/reble310//indexTH.htmand/reble310//indexR.htmendpoints.
- Session Hijacking via
- Product: R.V.R Elettronica TEX
- Vulnerabilities:
- Broken Access Control via
/_Passwd.htmlendpoints.
- Broken Access Control via
- Product: ITEL ISO FM SFN Adapter
- Vulnerabilities:
- Session Hijacking via
/home.htmlendpoints.
- Session Hijacking via
- Product: Dasan Switch DS2924
- Vulnerabilities:
- Authentication Bypass via Cookie-Based.
- Product: QVidium Opera11
- Vulnerabilities:
- Remote Code Execution via
/net_ping.cgiendpoint.
- Remote Code Execution via
- Product: Sencore SMP100 SMP Media Platform
- Vulnerabilities:
- Session Hijacking via
/UserManagement.htmlendpoint.
- Session Hijacking via
- Product: Eurolab ELTS100_UBX GPS
- Vulnerabilities:
- Broken Access Control via Endpoints.
-
Product Firmware Version WOLF1MS 0.8.5 to 1.0.3 WOLF2MS 0.8.5 to 1.0.3 puma 0.8.5 to 1.0.3 StreamerMAX MK II 0.8.5 to 1.0.3 - Vulnerabilities:
- Broken Access Control via Endpoints.
-
Product Firmware Version DAB Mux c041640a DAB Encoder 25aec8d DAB Gateway c041640a - Vulnerabilities:
- Authentication Bypass via Endpoints.
- Product: Newtec Celox UHD
- Vulnerabilities:
- Authentication Bypass via
/celoxserviceendpoint. - Privilege Escalation
- Authentication Bypass via
-
Product Firmware Version Vulnerabilitys Type IPGuard V2 2.10.0 Information Disclosure Leading to Unauthorized Access (CWE-798,CWE-200,CWE-522) ENENSYS ATSC3.0 1.6.1 Authentication Bypass via JWT Reuse and HTTP Response Manipulation (CWE-287,CWE-345,CWE-384)
-
Product Firmware Version Vulnerabilitys Type NS2000 Satellite Modem NS3000.7.x unauthenticated session hijacking and administrative access (CWE-306,CWE-285,CWE-640,CWE-434) NS3000 Satellite Modem NS2000.x unauthenticated session hijacking and administrative access (CWE-306,CWE-285,CWE-640,CWE-434)
- Product: GatesAir Flexiva-LX Series
- Vulnerabilities:
- Session Hijacking via
logendpoint.
- Session Hijacking via
- Product: Creacast Creabox Manager
- Vulnerabilities:
- Remote Code Execution (RCE).
- Authentication Bypass
- Information Disclosure
- Product: 2wcom IP-4c
- Vulnerabilities:
- Remote Code Execution (RCE).
- Information Disclosure
- Broken Access Control
-
Product Firmware Version Blackmagic ATEM Mini Pro 2.7 Blackmagic Web Presenter HD 3.3 - Vulnerabilities:
- Code Execution (CE) via Telnet.
- Information Disclosure via Telnet.
-
Product Firmware Version Vulnerabilitys Type PULSE-ECO AES67 1.22 Remote Code Execution (RCE) PULSE IP eco 1.22 Remote Code Execution (RCE) IMPACT 2.33 Remote Code Execution (RCE) FIRST 2.33 Remote Code Execution (RCE)
- Product:
- bridgetech VBC Server & Element Manager
- bridgetech probes
- bridgetech VB288 Objective QoE Content Extractor
- Vulnerabilities:
- Broken Access Control.
- Stored xss
- Information Disclosure
- Detailed Vulnerability Reports: Each directory contains a detailed description of the vulnerabilities, including affected endpoints, attack vectors, and impact.
- Suggested Fixes: Recommendations for mitigating the vulnerabilities are provided to help vendors and users secure their systems.
- CWE and CVE References: Vulnerabilities are mapped to Common Weakness Enumeration (CWE) and Common Vulnerabilities and Exposures (CVE) where applicable.
- Educational Purpose: This repository is intended for educational and research purposes to promote awareness and improve cybersecurity practices.
- Navigate to the directory corresponding to the vendor or product of interest.
- Review the vulnerability details, including the affected endpoints, attack types, and impact.
- Refer to the suggested fixes to understand how to mitigate the vulnerabilities.
- Use the information responsibly and only with proper authorization.
This repository is for educational and research purposes only. The vulnerabilities described here are intended to raise awareness and help improve the security of affected systems. Use this information responsibly and only with proper authorization. The maintainers of this repository are not responsible for any misuse of the information provided.
If you would like to contribute to this repository by adding new vulnerabilities or improving existing documentation, please follow these steps:
- Fork the repository.
- Create a new branch for your changes.
- Submit a pull request with a detailed description of your changes.
This project is licensed under the MIT License. See the LICENSE file for details.
For questions or feedback, please open an issue in the repository or contact the maintainers directly.