FURUNO FELCOM 250 and 500 devices allow unauthenticated access to the xml/permission.xml file containing all of the system's usernames and passwords. This includes the Admin and Service user accounts and their unsalted MD5 hashes, as well as the SMS server password in cleartext.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://cyberskr.com/blog/furuno-felcom.html | third party advisory exploit technical description |
https://gist.github.com/CyberSKR/c00eabd6b1d5603d724b615ab358ff31 | third party advisory |