Description
DBLTek GoIP-1 firmware versions up to and including GHSFVT-1.1-67-5 contain a local file inclusion vulnerability. The device's web server exposes handlers (`frame.html` and `frame.A100.html`) that accept a path parameter (`content` or `sidebar`) which is not properly validated or canonicalized. An attacker can supply directory-traversal sequences to cause the server to read and return arbitrary filesystem files that the webserver user can access. Other GoIP models and firmware versions are likely affected. Exploitation evidence was observed by the Shadowserver Foundation on 2024-03-21 UTC.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version
Timeline
| 2022-02-15: | Researcher publicly discloses vulnerability. |
Credits
Valtteri Lehtinen
Lassi Korhonen
References
www.exploit-db.com/exploits/50775
shufflingbytes.com/posts/hacking-goip-gsm-gateway/
shufflingbytes.com/posts/hacking-goip-gsm-gateway/
www.exploit-db.com/exploits/50775
www.dbltek.com/
www.vulncheck.com/advisories/dbltek-goip-unauthenticated-lfi