This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Critical Access Control Error in Q-Free MAXTIME Suite. <br>π₯ **Consequences**: Attackers can trigger a **factory reset** via crafted HTTP requests, causing total service disruption and data loss.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: **CWE-306** (Missing Authentication for Critical Function). <br>π **Flaw**: The `maxprofile/setup/routes.lua` script lacks identity verification, allowing unauthorized execution.
Q3Who is affected? (Versions/Components)
π’ **Vendor**: Q-Free. <br>π¦ **Product**: MaxTime (Local Traffic Signal Management). <br>π **Affected**: Versions **2.11.0 and earlier**.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Attacker Action**: Send specific HTTP requests to execute the reset function. <br>π **Impact**: **High Integrity (I:H)** & **High Availability (A:H)** impact.β¦
π **Public Exploit**: **No PoC provided** in the data. <br>π **Wild Exploitation**: Unknown status. However, the low barrier to entry makes it highly likely to be weaponized soon.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for Q-Free MAXTIME Suite services. <br>π§ͺ **Test**: Attempt to access `maxprofile/setup/routes.lua` endpoints. If no auth is prompted and the endpoint is reachable, you are vulnerable.