On AVTECH Room Alert 3E devices before 2.2.5, an attacker with access to the device's web interface may escalate privileges from an unauthenticated user to administrator by performing a cmd.cgi?action=ResetDefaults&src=RA reset and using the default credentials to get in.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://jordonlovik.wordpress.com/2019/07/06/roomalert-by-avtech-critical-vulnerability-disclosure/ | third party advisory exploit |
https://www.youtube.com/watch?v=X1PY7kMFkVg | third party advisory exploit |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010 |