Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-27964 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SonLogger < 6.4.1 allows **Unauthenticated Arbitrary File Upload**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Missing **Authentication** and **Input Validation**. The endpoint `/Config/SaveUploadedHotspotLogoFile` accepts POST requests without verifying user identity or checking file extensions/content.…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: **SonLogger** software by Sonlogger (Turkey). πŸ“… **Version**: All versions **before 6.4.1**. πŸ“¦ Specific mention of 4.2.3.3 in exploits. ⚠️ Check your version immediately!

Q4What can hackers do? (Privileges/Data)

πŸ’» **Attacker Actions**: Upload arbitrary files (like `.php` or `.jsp` shells). πŸ”“ **Privileges**: No auth required. πŸ“‚ **Data**: Full server access if the uploaded file is executed.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **VERY LOW**. πŸšͺ **Auth**: None required. πŸ“‘ **Config**: Just send a POST to `/Config/SaveUploadedHotspotLogoFile`. 🎯 Extremely easy to exploit for anyone with network access. πŸš€

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exp?**: **YES**. πŸ“œ PoC available via **Nuclei Templates** and PacketStorm. 🌐 Wild exploitation is likely given the ease of use. πŸ“₯ GitHub links provided in references. ⚑

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for SonLogger instances. πŸ§ͺ Test POST request to `/Config/SaveUploadedHotspotLogoFile` without headers. πŸ“€ Try uploading a test file. 🚨 If it accepts without auth, you are vulnerable! πŸ›‘

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fixed?**: **YES**. βœ… **Patch**: Upgrade to **SonLogger version 6.4.1** or later. πŸ“₯ Download from official release notes. πŸ”’ This resolves the auth and validation flaws. πŸ”„

Q9What if no patch? (Workaround)

🚧 **No Patch?**: **Workaround**: Block external access to `/Config/SaveUploadedHotspotLogoFile`. 🚫 Use WAF rules to deny POST requests to this endpoint. πŸ”’ Restrict network access to the admin interface. πŸ›‘οΈ

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **CRITICAL**. πŸ”΄ **Priority**: Patch immediately. 🚨 Unauthenticated RCE risk is high. πŸ“‰ Low exploitation barrier means active attacks are probable. πŸƒβ€β™‚οΈ Don't wait! πŸ›‘