CVE-2025-45585

5.4 MEDIUM

📋 TL;DR

Multiple stored cross-site scripting vulnerabilities in Audi UTR 2.0 Universal Traffic Recorder allow attackers to inject malicious scripts into wifi configuration parameters. This affects all users of Audi UTR 2.0 who have the web interface accessible, potentially enabling session hijacking or credential theft.

💻 Affected Systems

Products:
  • Audi UTR 2.0 Universal Traffic Recorder
Versions: All versions up to and including 2.0
Operating Systems: Embedded Linux-based system
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configuration when web interface is enabled. Requires access to wifi configuration settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains administrative access, modifies device configuration, intercepts network traffic, or installs persistent malware on connected systems.

🟠

Likely Case

Session hijacking, credential theft from administrators, defacement of web interface, or redirection to malicious sites.

🟢

If Mitigated

Limited to interface disruption if input validation blocks most payloads, but some bypasses may still work.

🌐 Internet-Facing: HIGH - Web interface exposed to internet allows remote exploitation without authentication.
🏢 Internal Only: MEDIUM - Requires attacker to have internal network access, but exploitation is straightforward once access is gained.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires access to wifi configuration interface. No public exploit code available, but vulnerability is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.1 or later

Vendor Advisory: https://2barbie.notion.site/2024-Audi-UTR-2-0-Report-1bff0be688c680cb8795efe78732f8b9

Restart Required: No

Instructions:

1. Check current version via web interface. 2. Download latest firmware from vendor. 3. Upload firmware via web interface. 4. Apply update without restarting services.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement client-side and server-side input validation for wifi_sta_ssid and wifi_ap_ssid parameters

Implement regex filter: ^[a-zA-Z0-9\s\-_.]{1,32}$ for SSID fields

Web Interface Restriction

linux

Restrict access to web interface using firewall rules or network segmentation

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate UTR device from sensitive networks
  • Deploy web application firewall (WAF) with XSS protection rules in front of the interface

🔍 How to Verify

Check if Vulnerable:

Attempt to inject basic XSS payload like <script>alert('test')</script> into wifi_sta_ssid or wifi_ap_ssid fields and check if it executes when page reloads

Check Version:

Check web interface dashboard or use curl: curl -s http://device-ip/status | grep version

Verify Fix Applied:

Test same payload after patch - it should be properly sanitized or rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual characters in wifi configuration logs
  • Multiple failed login attempts followed by configuration changes

Network Indicators:

  • HTTP requests with script tags in POST parameters to wifi configuration endpoints

SIEM Query:

source="web_logs" AND (uri_path="/config/wifi" OR uri_path="/settings") AND (param="wifi_sta_ssid" OR param="wifi_ap_ssid") AND (content="<script>" OR content="javascript:")

🔗 References

📤 Share & Export