CVE-2019-25465

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform directory traversal attacks on Hisilicon HiIpcam V100R003 devices, exposing sensitive configuration files including ADSL credentials and network settings. Attackers can retrieve usernames, passwords, and DNS configurations without authentication. This affects all deployments of the vulnerable HiIpcam firmware version.

💻 Affected Systems

Products:
  • Hisilicon HiIpcam
Versions: V100R003
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected. The vulnerability exists in the web interface's CGI implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full network access credentials, allowing them to compromise the entire network infrastructure, perform man-in-the-middle attacks, or pivot to other systems using stolen credentials.

🟠

Likely Case

Attackers steal ADSL credentials and network configuration, enabling unauthorized network access, credential reuse attacks, and potential device takeover.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the specific device, though credentials may still be compromised.

🌐 Internet-Facing: HIGH - The vulnerability is unauthenticated and can be exploited remotely via HTTP requests to the CGI endpoint.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but requires network access to the device's web interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB. Attack requires only HTTP GET requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check with Hisilicon for firmware updates or consider device replacement.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to the device's web interface using firewall rules or network segmentation.

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

CGI Endpoint Blocking

all

Block access to the vulnerable getadslattr.cgi endpoint using web server configuration or WAF rules.

location ~ /cgi-bin/getadslattr\.cgi { deny all; }

🧯 If You Can't Patch

  • Isolate affected devices in a separate VLAN with strict firewall rules preventing external access
  • Implement network monitoring for suspicious requests to /cgi-bin/getadslattr.cgi and alert on credential extraction attempts

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://device_ip/cgi-bin/getadslattr.cgi and check if it returns ADSL configuration data without authentication.

Check Version:

Check device web interface or firmware version in device settings. Command varies by device model.

Verify Fix Applied:

After implementing workarounds, verify the endpoint returns access denied or connection refused when accessed.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /cgi-bin/getadslattr.cgi
  • Unusual access patterns to configuration files
  • Failed authentication attempts followed by CGI access

Network Indicators:

  • HTTP traffic to port 80/443 with User-Agent strings containing exploit tools
  • Outbound connections from device after credential extraction

SIEM Query:

source="web_logs" AND (url="/cgi-bin/getadslattr.cgi" OR url CONTAINS "getadslattr")

🔗 References

📤 Share & Export