CVE-2025-45620

8.1 HIGH

📋 TL;DR

A vulnerability in Aver PTC310UV2 firmware allows remote attackers to retrieve sensitive information through specially crafted requests. This affects all systems running the vulnerable firmware version, potentially exposing configuration data, credentials, or other sensitive information to unauthorized parties.

💻 Affected Systems

Products:
  • Aver PTC310UV2
Versions: v.0.1.0000.59
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the specified firmware version are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with exposure of administrative credentials, configuration secrets, and potential lateral movement to other network devices.

🟠

Likely Case

Information disclosure of device configuration, network settings, and potentially authentication tokens that could enable further attacks.

🟢

If Mitigated

Limited exposure of non-critical system information with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing devices particularly vulnerable to scanning and automated attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to gather sensitive information for lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

GitHub repository contains proof-of-concept code. The vulnerability requires only network access and crafted HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://aver.com

Restart Required: Yes

Instructions:

1. Check vendor website for firmware updates
2. Download latest firmware from official Aver site
3. Follow device-specific firmware update procedure
4. Verify successful update and restart device

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Aver PTC310UV2 devices from untrusted networks and internet access

Access Control Lists

linux

Implement strict firewall rules to limit access to device management interfaces

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Segment device on isolated VLAN with strict access controls
  • Monitor network traffic to/from device for suspicious request patterns

🔍 How to Verify

Check if Vulnerable:

Check device web interface or serial console for firmware version. If version is 0.1.0000.59, device is vulnerable.

Check Version:

Check device web interface at http://device-ip/status or via serial console

Verify Fix Applied:

Verify firmware version has been updated to a version later than 0.1.0000.59

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP request patterns to device management interface
  • Multiple failed authentication attempts followed by information disclosure requests

Network Indicators:

  • HTTP requests with unusual parameters or paths to device management interface
  • Traffic from unexpected sources to device port 80/443

SIEM Query:

source_ip=* AND dest_ip=device_ip AND (http_method=GET OR http_method=POST) AND (uri CONTAINS "/config" OR uri CONTAINS "/admin" OR uri CONTAINS "/system")

🔗 References

📤 Share & Export