Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device’s webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user’s Wi-Fi credentials are stored in clear text on the device and can be pulled easily.
View Full Alert
Related Posts
CVE-2017-14854 (siteomat)A stack buffer overflow exists in one of the Orpak SiteOmat CGI components, allowing for remote code execution. The vulnerability affects all versions prior to 2017-09-25. View Full Alert
CVE-2017-14851 (siteomat)A SQL injection vulnerability exists in all Orpak SiteOmat versions prior to 2017-09-25. The vulnerability is in the login page, where the authentication validation process contains an insecure SELECT query.…
CVE-2017-14852 (siteomat)An insecure communication was found between a user and the Orpak SiteOmat management console for all known versions, due to an invalid SSL certificate. The attack allows for an eavesdropper…