CVE-2025-63209

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to retrieve admin credentials and system settings from ELCA Star Transmitter Remote Control devices via an unprotected /setup.xml endpoint. The admin password is stored in plaintext, potentially leading to remote compromise of transmitter systems. Affected devices include STAR150, BP1000, STAR300, STAR2000, STAR1000, STAR500, and possibly other models running firmware version 1.25.

💻 Affected Systems

Products:
  • ELCA Star Transmitter Remote Control
Versions: firmware 1.25
Operating Systems: embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects STAR150, BP1000, STAR300, STAR2000, STAR1000, STAR500 models and possibly others. The vulnerability exists in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of transmitter systems, potentially disrupting critical communications infrastructure, manipulating transmission settings, or using devices as footholds into broader networks.

🟠

Likely Case

Attackers steal admin credentials and sensitive system configuration data, enabling unauthorized access to transmitter control interfaces and potential service disruption.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to information disclosure without direct system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP GET requests to the vulnerable endpoint. Public GitHub repository contains research details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: unknown

Vendor Advisory: https://www.elcaradio.com

Restart Required: No

Instructions:

1. Check vendor website for firmware updates. 2. If patch available, download from official vendor source. 3. Follow vendor's firmware update procedures for affected transmitter models.

🔧 Temporary Workarounds

Network Access Restriction

linux

Block external access to transmitter management interfaces using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

Endpoint Protection

all

Implement web application firewall rules to block access to /setup.xml endpoint

WAF rule: deny requests to path '/setup.xml'

🧯 If You Can't Patch

  • Isolate transmitter management interfaces to dedicated VLAN with strict access controls
  • Implement network monitoring for unauthorized access attempts to /setup.xml endpoint

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://[device_ip]/setup.xml and check if response contains plaintext password in <p05> tag

Check Version:

Check device web interface or consult vendor documentation for firmware version

Verify Fix Applied:

After applying controls, verify HTTP GET to /setup.xml returns access denied or no sensitive data

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /setup.xml from unauthorized sources
  • Failed authentication attempts followed by successful /setup.xml access

Network Indicators:

  • Unusual HTTP traffic patterns to transmitter management ports
  • External IP addresses accessing /setup.xml endpoint

SIEM Query:

source_ip NOT IN (trusted_networks) AND http_request_path = '/setup.xml'

🔗 References

📤 Share & Export