Vulnerability Description
/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Airtame | Hdmi Dongle Firmware | <= 2.3.3 |
| Airtame | Hdmi Dongle | - |
Related Weaknesses (CWE)
References
- https://www.utkusen.com/blog/multiple-vulnerabilities-on-airtame-device-before-vThird Party Advisory
- https://www.utkusen.com/blog/multiple-vulnerabilities-on-airtame-device-before-vThird Party Advisory
FAQ
What is CVE-2017-15304?
CVE-2017-15304 is a vulnerability with a CVSS score of 9.8 (CRITICAL). /bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persiste...
How severe is CVE-2017-15304?
CVE-2017-15304 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-15304?
Check the references section above for vendor advisories and patch information. Affected products include: Airtame Hdmi Dongle Firmware, Airtame Hdmi Dongle.