This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Critical Access Control Error in Q-Free MAXTIME Suite. <br>π₯ **Consequences**: Attackers can enable password-less guest mode via crafted HTTP requests.β¦
π’ **Vendor**: Q-Free. <br>π¦ **Product**: MAXTIME Suite (Local traffic signal management). <br>β οΈ **Affected Versions**: **v2.11.0 and earlier**.
Q4What can hackers do? (Privileges/Data)
π **Attacker Actions**: <br>1. Enable **Guest Mode** without a password. <br>2. Gain unauthorized access to traffic signal management controls. <br>3. Potentially disrupt local traffic flow or manipulate signal data.
π’ **Public Exploit**: **No PoC provided** in current data. <br>β οΈ **Risk**: Despite no public code, the CVSS score is **Critical (9.8)**. Theoretical exploitation is highly feasible due to low barriers.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Scan for **Q-Free MAXTIME Suite** services. <br>2. Check version numbers (β€ 2.11.0). <br>3. Attempt to access `/maxprofile/guest-mode/routes.lua` endpoints (if safe/authorized). <br>4.β¦
π οΈ **Official Fix**: **Patch Available**. <br>π **Published**: 2025-02-12. <br>β **Action**: Update to a version **newer than 2.11.0** immediately.