Samsung WLAN AP WEA453e Vulnerabilities

Omri Inbar
4 min readNov 24, 2020

In August 2020 I discovered multiple vulnerabilities in Samsung WLAN AP WEA453e, including a pre-auth root RCE, which means an attacker could run code as root remotely without logging in.

Vulnerability #1: XSS

The first thing I found is an interesting reflected parameter in the form of an error message when navigating to a nonexistent path:

I tried the most standard XSS payload “<script>alert(1)</script>” and sure enough an alert popped:

Vulnerability #2: LFI

Because the previous error message showed the absolute path “/tmp/www/” I figured maybe if I tried to backtrack with “../” I could read any file on the file system. I Fired up BurpSuite and found something interesting: When I gave a path to a file that doesn’t exist, I got the error message. But when I entered a file that does exist, I got redirected to the login page:

At this point I figured that an LFI from here is impossible, but maybe with an authenticated user I could get more findings.

I quickly googled the default credentials (root:sweap12~) and logged in. I then found a very interesting request in the Administration tab. Under “Tech Support” there is a button that lets you download some sort of compressed file in tar format.

Jackpot!

It looks like the request is vulnerable to Local File Inclusion and Remote Code Execution!

We can see that the requests include the “command1” and “command2” parameters which contain linux commands. The command in “command1” deletes the previous file and the command in “command2” creates the new one.

The path which the request is sent to is: “(download)/the_path_of_the_newly_created_file”.

From this request we will be able to run a command, save the output to a file and read the file.

We’ll start with the LFI and try to change the request path to a file in a known local path, like “/etc/shadow”:

I managed to read “/etc/shadow” which shows us that the server is running under root privileges.

Vulnerability #3: RCE

The next step is to replace the current commands with our own crafted command and read the output. I changed the value of “command1” to “ls -la | dd of=/tmp/a.txt” which lists the current directory contents and saves the output to “/tmp/a.txt”.

In addition, I changed the request path to “(download)/tmp/a.txt” in order to read the output of the command.

I tried to change the request method from POST to GET for an easier exploitation and it worked as well:

The last thing I did was to try the exploit without being logged on with a valid user and to my delight it worked like a charm. This shows this is an Unauthenticated Remote Code Execution.

Vulnerable instances can be found by using google dork:

intitle:”Samsung WLAN AP”

or shodan query:

title:”Samsung WLAN AP”

The relevant team at Samsung has been informed and they have confirmed that these vulnerabilities have been patched in version 5.2.4.T1.

--

--