Alexandre Teyar

6 exploits Active since Nov 2019
CVE-2017-12945 NOMISEC HIGH WORKING POC
Mersive Solstice Firmware < 2.8.4 - OS Command Injection
Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as root.
4 stars
CVSS 8.8
CVE-2020-35584 WRITEUP MEDIUM WRITEUP
Mersive Solstice Pod Firmware < 3.0.3 - Cleartext Transmission
In Solstice Pod before 3.0.3, the web services allow users to connect to them over unencrypted channels via the Browser Look-in feature. An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their interactions with the web services and obtain any information the user supplies, including Administrator passwords and screen keys.
CVSS 5.9
CVE-2020-35585 WRITEUP HIGH WRITEUP
Mersive Solstice Pod Firmware < 3.3.0 - Brute Force
In Solstice Pod before 3.3.0 (or Open4.3), the screen key can be enumerated using brute-force attacks via the /lookin/info Solstice Open Control API because there are only 1.7 million possibilities.
CVSS 7.5
CVE-2020-35586 WRITEUP HIGH WRITEUP
Mersive Solstice Pod Firmware < 3.0.3 - Brute Force
In Solstice Pod before 3.3.0 (or Open4.3), the Administrator password can be enumerated using brute-force attacks via the /Config/service/initModel?password= Solstice Open Control API because there is no complexity requirement (e.g., it might be all digits or all lowercase letters).
CVSS 7.5
CVE-2020-35587 WRITEUP HIGH WRITEUP
Mersive Solstice Firmware < 3.0.3 - Missing Encryption
In Solstice Pod before 3.0.3, the firmware can easily be decompiled/disassembled. The decompiled/disassembled files contain non-obfuscated code. NOTE: it is unclear whether lack of obfuscation is directly associated with a negative impact, or instead only facilitates an attack technique
CVSS 7.5
CVE-2017-12945 EXPLOITDB HIGH python WORKING POC
Mersive Solstice Firmware < 2.8.4 - OS Command Injection
Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as root.
CVSS 8.8