CVE-2024-39178

5.4 MEDIUM

📋 TL;DR

MyPower vc8100 V100R001C00B030 contains an arbitrary file read vulnerability in the /tcpdump/tcpdump.php component via the menu_uuid parameter. This allows attackers to read sensitive files from the system without authentication. Organizations using this specific version of MyPower vc8100 are affected.

💻 Affected Systems

Products:
  • MyPower vc8100
Versions: V100R001C00B030
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version mentioned; other versions may be vulnerable but unconfirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive configuration files, credentials, or system files leading to complete system compromise and lateral movement.

🟠

Likely Case

Unauthenticated attackers reading configuration files, logs, or other sensitive data to gather information for further attacks.

🟢

If Mitigated

Limited to reading non-critical files if proper file permissions and network segmentation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simple HTTP requests; public GitHub repository contains proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates or contact Maipu support.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Restrict access to /tcpdump/tcpdump.php via web server configuration or firewall rules.

# Apache: RewriteRule ^/tcpdump/tcpdump\.php - [F,L]
# Nginx: location ~ /tcpdump/tcpdump\.php { deny all; }

Network Segmentation

all

Isolate MyPower devices from untrusted networks and limit access to management interfaces.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the device's web interface.
  • Monitor logs for unusual access patterns to /tcpdump/tcpdump.php and implement file integrity monitoring.

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[device_ip]/tcpdump/tcpdump.php?menu_uuid=../../etc/passwd and check if system files are returned.

Check Version:

Check web interface or CLI for firmware version; should show V100R001C00B030 if vulnerable.

Verify Fix Applied:

Verify the endpoint returns an error or is inaccessible after applying workarounds.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /tcpdump/tcpdump.php with directory traversal patterns in parameters
  • Unusual file access patterns in system logs

Network Indicators:

  • HTTP GET requests containing ../ sequences in query parameters

SIEM Query:

source="web_logs" AND uri_path="/tcpdump/tcpdump.php" AND query_string="*../*"

🔗 References

📤 Share & Export