From there, an attacker can gain unauthorized access to the radio and its OS. The Telnetd service uses weak passwords with hardcoded credentials, which can be cracked using simple brute-forcing tactics. The issue (CVE-2019-13473) exists in an always-on, undocumented Telnet service (Telnetd) that connects to Port 23 of the radio. Adversaries can deliver malware, add a compromised radio to a botnet, send custom audio streams to the device, listen to all station messages as well as uncover the Wi-Fi password for any network the radio is connected to. Imperial Dabman IoT radios have a weak password vulnerability that could allow a remote attacker to achieve root access to the gadgets’ embedded Linux BusyBox operating system, gaining control over the device.
0 Comments
Leave a Reply. |