<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="https://cdino.net/feed.xml" rel="self" type="application/atom+xml" /><link href="https://cdino.net/" rel="alternate" type="text/html" /><updated>2026-04-08T15:57:36+00:00</updated><id>https://cdino.net/feed.xml</id><title type="html">christopher di-nozzi</title><subtitle>free web hosting ftw</subtitle><entry><title type="html">VDE-2024-033 (CVE-2024-5849 + CVE-2024-38502)</title><link href="https://cdino.net/blog/2024/vde-2024-033/" rel="alternate" type="text/html" title="VDE-2024-033 (CVE-2024-5849 + CVE-2024-38502)" /><published>2024-11-28T00:00:00+00:00</published><updated>2024-11-28T00:00:00+00:00</updated><id>https://cdino.net/blog/2024/vde-2024-033</id><content type="html" xml:base="https://cdino.net/blog/2024/vde-2024-033/"><![CDATA[<p>Two XSS vulnerabilities were discovered within the DeviceMaster web interface that can be trivially exploited. These could be used to conduct social engineering attacks, reboot the DeviceMaster, send web requests to other devices in the network, or potentially lock the device up.</p>

<h2 id="reflected-xss-cve-2024-5849">Reflected XSS (CVE-2024-5849)</h2>

<p>A vulnerability within the <code class="language-plaintext highlighter-rouge">port.asp</code> endpoint of the DeviceMaster web interface allows for arbitrary inputs to be reflected onto the webpage via the <code class="language-plaintext highlighter-rouge">p</code> variable.</p>

<h3 id="poc">PoC</h3>

<p>A simple alert box:</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>http://192.168.1.20/port.asp?p=12&lt;script&gt;alert(1)&lt;/script&gt;
</code></pre></div></div>

<p>Reboot the device by sending a GET request to the <code class="language-plaintext highlighter-rouge">resetUnit</code> endpoint:</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>http://192.168.1.20/port.asp?p=12&lt;script&gt;fetch('http://192.168.1.20/goforms/resetUnit')&lt;/script&gt;
</code></pre></div></div>

<h3 id="mitigations">Mitigations</h3>

<p>Upgrade to the latest firmware — see <a href="https://certvde.com/en/advisories/VDE-2024-033/">vendor publication</a> for details.</p>

<h2 id="stored-xss-cve-2024-38502">Stored XSS (CVE-2024-38502)</h2>

<h3 id="poc-1">PoC</h3>

<p>The JS payload can be placed in the <code class="language-plaintext highlighter-rouge">filename</code> parameter sent to the <code class="language-plaintext highlighter-rouge">load_config_form</code> endpoint. The XMP tag must first be escaped, then restarted at the end of the payload.</p>

<p>When the system log page loads, the code executes — because the filename is written into the system log, injecting the payload.</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>filename="&lt;/xmp&gt;PAYLOAD&lt;xmp&gt;"
</code></pre></div></div>

<p><img src="/blog/res/CVE-2024-38502_poc.png" alt="CVE-2024-38502 PoC screenshot" /></p>

<h3 id="mitigations-1">Mitigations</h3>

<p>Upgrade to the latest firmware — see <a href="https://certvde.com/en/advisories/VDE-2024-033/">vendor publication</a> for details.</p>

<p>If exploited, the payload can be cleared by clearing the system log.</p>

<h2 id="conclusion">Conclusion</h2>

<p>As demonstrated, the above vulnerabilities could be used to force the device to reboot, causing system downtime. There is also potential to use them to set a random password on the device, which may require a factory reset to re-enable access — although this was not tested.</p>

<p>These exploits could also be used to communicate with other devices on the network, giving an attacker a foothold to probe further.</p>

<p>These vulnerabilities were basic and trivial to exploit. These types of attacks should not be overlooked or assumed to be mitigated when testing against OT devices.</p>]]></content><author><name></name></author><summary type="html"><![CDATA[Two XSS vulnerabilities in the DeviceMaster web interface — reflected and stored, trivially exploitable, with real OT impact.]]></summary></entry></feed>