CVE-2025-28232

9.1 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass authentication and access the admin panel of JMBroadcast JMB0150 devices. Attackers can gain administrative privileges without credentials, potentially compromising the entire device. All users running the vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • JMBroadcast JMB0150
Versions: Firmware v1.0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with the vulnerable firmware version; other versions may not be impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to reconfigure settings, deploy malware, use the device as a pivot point in the network, or disrupt broadcast operations.

🟠

Likely Case

Unauthorized access to administrative functions leading to configuration changes, data exposure, or service disruption.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and strong authentication controls are in place elsewhere.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a specific endpoint (HOME.php) that doesn't require authentication, making exploitation trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check with JMBroadcast for firmware updates. If available, download the patched firmware and follow vendor instructions to update the device.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to the device's admin interface using firewall rules or network segmentation.

Web Server Configuration

all

If possible, modify web server configuration to block or restrict access to the vulnerable HOME.php endpoint.

🧯 If You Can't Patch

  • Isolate the device on a separate network segment with strict access controls
  • Implement network monitoring and intrusion detection for unauthorized access attempts to the admin panel

🔍 How to Verify

Check if Vulnerable:

Attempt to access the admin panel via the HOME.php endpoint without authentication. If access is granted, the device is vulnerable.

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

After applying any fix, attempt the same unauthenticated access to confirm it's now blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to HOME.php endpoint
  • Admin panel access from unexpected IP addresses

Network Indicators:

  • HTTP requests to HOME.php without preceding authentication requests
  • Unusual admin panel activity patterns

SIEM Query:

source_ip=* AND destination_port=80 AND url_path="/HOME.php" AND NOT (http_method="POST" AND form_data CONTAINS "login")

🔗 References

📤 Share & Export