| Title | Technostrobe HI-LED-WR120-G2 Obstruction Lighting Controller 5.5.0.1R6.03.30 Authentication Bypass Issues |
|---|
| Description | Authentication enforcement is performed on the client side rather than the server. By intercepting and modifying HTTP responses, an attacker can bypass authentication.
Bug 1.1 — Config Panel Bypass
Target
http://technostrobe.shiky.demo:58746/Config/index_config.html
?idx=1?userId=0002?keyId=NjliNTAyZjNiNA#StatusPage
Steps to Reproduce
Set up Burp Suite as HTTP proxy
Navigate to the config URL
In Burp's Intercept tab, intercept the POST response to /LoginCB then drop it
Modify the auth result to indicate success
Forward — the full configuration panel renders
Bug 1.2 — Direct Access (No Proxy Needed)
GET /Technostrobe/surveillance_generale.html
?idx=1?userId=0002?keyId=NjliNTAyZjNiNA
This one doesn't even need response manipulation. The server serves the page directly with no authentication check at all. Just visiting the URL works.
Type URL in browser bar
|
Full surveillance dashboard loads
|
No login prompt. No session check. Nothing.
Bug 1.3 — Light Control Board Bypass
Target
http://technostrobe.shiky.demo:58746/Technostrobe/surveillance_ctrlboard.html
?idx=1?userId=0001?keyId=NjliNTAyZjNiNA
This is the highest impact instance. The light control board allows:
Changing light flash patterns
Toggling lights on/off
Modifying timing sequences
┌──────────────────────────────────────────────────────────────────┐
│ WHAT THE LIGHT CONTROL BOARD CONTROLS │
│ │
│ Flash Pattern: -> can be changed remotely │
│ Flash Rate: [72 fpm ] -> FAA requires specific rates │
│ Intensity: [100% ] -> day/night levels │
│ Sync: [enabled ] -> multi-tower sync │
│ │
│ If this is tampered with: │
│ - Lights go dark -> aviation hazard │
│ - Wrong pattern -> confuses pilots │
│ - Sync broken -> regulatory violation │
└──────────────────────────────────────────────────────────────────┘
Same bypass method as 1.1: intercept the /LoginCB response and modify it to indicate auth success.
The server does not validate session state for subsequent requests.
Root Cause:
Authentication decisions rely on client-side logic instead of server-side validation.
Impact:
Full authentication bypass
Unauthorized access to admin functionality
No valid credentials required |
|---|
| Source | ⚠️ https://github.com/shiky8/my--cve-vulnerability-research/blob/main/my_VulnDB_cves/CVE-TECHNOSTROBE-02-AuthBypass.md |
|---|
| User | shiky8 (UID 96565) |
|---|
| Submission | 03/20/2026 01:16 (18 days ago) |
|---|
| Moderation | 04/04/2026 16:41 (16 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 355340 [Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30 /LoginCB index_config improper authentication] |
|---|
| Points | 20 |
|---|