This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π‘οΈ **Root Cause**: Missing **Authentication** and **Input Validation**. The endpoint `/Config/SaveUploadedHotspotLogoFile` accepts POST requests without verifying user identity or checking file extensions/content.β¦
π― **Affected**: **SonLogger** software by Sonlogger (Turkey). π **Version**: All versions **before 6.4.1**. π¦ Specific mention of 4.2.3.3 in exploits. β οΈ Check your version immediately!
Q4What can hackers do? (Privileges/Data)
π» **Attacker Actions**: Upload arbitrary files (like `.php` or `.jsp` shells). π **Privileges**: No auth required. π **Data**: Full server access if the uploaded file is executed.β¦
π **Threshold**: **VERY LOW**. πͺ **Auth**: None required. π‘ **Config**: Just send a POST to `/Config/SaveUploadedHotspotLogoFile`. π― Extremely easy to exploit for anyone with network access. π
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp?**: **YES**. π PoC available via **Nuclei Templates** and PacketStorm. π Wild exploitation is likely given the ease of use. π₯ GitHub links provided in references. β‘
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for SonLogger instances. π§ͺ Test POST request to `/Config/SaveUploadedHotspotLogoFile` without headers. π€ Try uploading a test file. π¨ If it accepts without auth, you are vulnerable! π
Q8Is it fixed officially? (Patch/Mitigation)
π‘οΈ **Fixed?**: **YES**. β **Patch**: Upgrade to **SonLogger version 6.4.1** or later. π₯ Download from official release notes. π This resolves the auth and validation flaws. π
Q9What if no patch? (Workaround)
π§ **No Patch?**: **Workaround**: Block external access to `/Config/SaveUploadedHotspotLogoFile`. π« Use WAF rules to deny POST requests to this endpoint. π Restrict network access to the admin interface. π‘οΈ
Q10Is it urgent? (Priority Suggestion)
β‘ **Urgency**: **CRITICAL**. π΄ **Priority**: Patch immediately. π¨ Unauthenticated RCE risk is high. π Low exploitation barrier means active attacks are probable. πββοΈ Don't wait! π