Sielco PolyEco Digital FM Transmitter 2.0.6 Radio Data System POST Manipulation

Title: Sielco PolyEco Digital FM Transmitter 2.0.6 Radio Data System POST Manipulation
Advisory ID: ZSL-2023-5767
Type: Local/Remote
Impact: Security Bypass, Cross-Site Scripting
Risk: (4/5)
Release Date: 10.04.2023
Summary
PolyEco is the innovative family of high-end digital FM transmitters of Sielco. They are especially suited as high performance power system exciters or compact low-mid power transmitters. The same cabinet may in fact be fitted with 50, 100, 300, 500, 1000W power stage (PolyEco50, 100, 300, 500, 1000).

All features can be controlled via the large touch-screen display 4.3" or remotely. Many advanced features are inside by default in the basic version such as: stereo and RDS encoder, audio change-over, remote-control via LAN and SNMP, "FFT" spectral analysis of the audio sources, SFN synchronization and much more.
Description
Improper access control occurs when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions and manipulate the RDS text display.
Vendor
Sielco S.r.l - https://www.sielco.org
Affected Version
PolyEco1000 CPU:2.0.6 FPGA:10.19
PolyEco1000 CPU:1.9.4 FPGA:10.19
PolyEco1000 CPU:1.9.3 FPGA:10.19
PolyEco500 CPU:1.7.0 FPGA:10.16
PolyEco300 CPU:2.0.2 FPGA:10.19
PolyEco300 CPU:2.0.0 FPGA:10.19
Tested On
lwIP/2.1.1 (http://savannah.nongnu.org/projects/lwip)
Vendor Status
[26.01.2023] Vulnerability discovered.
[27.01.2023] Contact with the vendor and CSIRT Italia.
[09.04.2023] No response from the vendor.
[09.04.2023] No response from the CSIRT team.
[10.04.2023] Public security advisory released.
PoC
sielco_polyeco_rds.txt
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://www.exploit-db.com/exploits/51369
[2] https://packetstormsecurity.com/files/171857/
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/269702
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/253065
[5] https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
[6] https://nvd.nist.gov/vuln/detail/CVE-2023-46663
[7] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46663
Changelog
[10.04.2023] - Initial release
[03.11.2023] - Added reference [1], [2], [3], [4], [5], [6] and [7]
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk