Enviar #783323: Technostrobe HI-LED-WR120-G2 Obstruction Lighting Controller 5.5.0.1R6.03.30 Authentication Bypass Issuesinformación

TítuloTechnostrobe HI-LED-WR120-G2 Obstruction Lighting Controller 5.5.0.1R6.03.30 Authentication Bypass Issues
DescripciónAuthentication enforcement is performed on the client side rather than the server. By intercepting and modifying HTTP responses, an attacker can bypass authentication. Bug 1.1 — Config Panel Bypass Target http://technostrobe.shiky.demo:58746/Config/index_config.html ?idx=1?userId=0002?keyId=NjliNTAyZjNiNA#StatusPage Steps to Reproduce Set up Burp Suite as HTTP proxy Navigate to the config URL In Burp's Intercept tab, intercept the POST response to /LoginCB then drop it Modify the auth result to indicate success Forward — the full configuration panel renders Bug 1.2 — Direct Access (No Proxy Needed) GET /Technostrobe/surveillance_generale.html ?idx=1?userId=0002?keyId=NjliNTAyZjNiNA This one doesn't even need response manipulation. The server serves the page directly with no authentication check at all. Just visiting the URL works. Type URL in browser bar | Full surveillance dashboard loads | No login prompt. No session check. Nothing. Bug 1.3 — Light Control Board Bypass Target http://technostrobe.shiky.demo:58746/Technostrobe/surveillance_ctrlboard.html ?idx=1?userId=0001?keyId=NjliNTAyZjNiNA This is the highest impact instance. The light control board allows: Changing light flash patterns Toggling lights on/off Modifying timing sequences ┌──────────────────────────────────────────────────────────────────┐ │ WHAT THE LIGHT CONTROL BOARD CONTROLS │ │ │ │ Flash Pattern: -> can be changed remotely │ │ Flash Rate: [72 fpm ] -> FAA requires specific rates │ │ Intensity: [100% ] -> day/night levels │ │ Sync: [enabled ] -> multi-tower sync │ │ │ │ If this is tampered with: │ │ - Lights go dark -> aviation hazard │ │ - Wrong pattern -> confuses pilots │ │ - Sync broken -> regulatory violation │ └──────────────────────────────────────────────────────────────────┘ Same bypass method as 1.1: intercept the /LoginCB response and modify it to indicate auth success. The server does not validate session state for subsequent requests. Root Cause: Authentication decisions rely on client-side logic instead of server-side validation. Impact: Full authentication bypass Unauthorized access to admin functionality No valid credentials required
Fuente⚠️ https://github.com/shiky8/my--cve-vulnerability-research/blob/main/my_VulnDB_cves/CVE-TECHNOSTROBE-02-AuthBypass.md
Usuario
 shiky8 (UID 96565)
Sumisión2026-03-20 01:16 (hace 19 días)
Moderación2026-04-04 16:41 (16 days later)
EstadoAceptado
Entrada de VulDB355340 [Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30 /LoginCB index_config autenticación débil]
Puntos20

Do you need the next level of professionalism?

Upgrade your account now!