Share
[Author:] Tim Tepatti  
[Website:] tepatti.com  
  
[Title:] Hard-coded credentials on ProGrade/Lierda Grill Temperature  
Monitor [CVE-2019-15304]  
  
[Product:] Grill Temperature Monitor  
[Manufacturer:] ProGrade / Lierda  
[Affected Version(s):] V1.00_50006  
[Tested Version(s):] V1.00_50006  
[Vulnerability Type:] Use of hard-coded credentials (CWE ID 798)  
[CVE Reference:] CVE-2019-15304  
  
  
[TL;DR:]  
  
ProGrade/Lierda Grill Temperature Monitor V1.00_50006 has a default  
password of admin for the admin account, which allows an attacker to  
cause a Denial of Service or Information Disclosure via the  
undocumented access-point configuration page located on the device.  
  
[Long Info:]  
  
ProGrade/Lierda Grill Temperature Monitor V1.00_50006 has a default  
password of admin for the admin account, which allows an attacker to  
cause a Denial of Service or Information Disclosure via the  
undocumented access-point configuration page located on the device.  
  
The access point configuration page is never made known to the end  
user - the user is never supposed to access it or change any of the  
options, and as such, the end user has no idea that an attacker could  
access this page. This is different than a normal access point or  
internet router where the administration page is required for setup  
and configuration, and the end user is made aware of the risk of  
default credentials. This makes the vulnerability more severe because  
the attack vector is something which the end user wasn't aware even  
operated on their device.  
  
Additionally, there were two vendors provided because Lierda is a  
wholesaler who actually created the device, and ProGrade simply  
re-branded the device for the American market. This way, both  
customers will be aware of the security vulnerabilities in the  
product.  
  
[Technical Info:]  
  
[Default Web Server IP:] 11.11.11.254  
[Default Web Server Port:] 80  
  
[Reference(s):] http://progradegrill.com/wifi-grilling-thermometer/