TamronOS IPTV Account Creation Scanner
Detects 'Unauthenticated Admin Account Creation' vulnerability in TamronOS IPTV.
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
27 days 1 hour
Scan only one
URL
Toolbox
-
The TamronOS IPTV system is used widely in media and broadcast industries for providing Internet Protocol Television services. It is employed by service providers to deliver video content seamlessly via the internet. The software simplifies the content distribution network and makes it convenient for operators to manage subscribers, broadcasting, and accounts. Companies and organizations in need of an efficient IPTV service often choose TamronOS IPTV for its ease of use and robust features. Users can navigate through various options and multimedia content efficiently, tailored for an optimal viewing experience. It is particularly useful for organizations that require a versatile streaming platform that can handle numerous concurrent connections and content management tasks.
The vulnerability in question allows unauthenticated attackers to create multiple admin-level accounts on the TamronOS IPTV system. Without proper checks in place to verify the authenticity of a user attempting to create an account, the system can be manipulated to allow arbitrary users. This can potentially result in a scenario where unauthorized personnel gain access to sensitive configuration and management interfaces. Such vulnerabilities are critical as they expose the system to exploitation from a wide range of attack vectors and can compromise data integrity and security. This issue stands as a significant threat that could lead to broader security breaches if not mitigated.
The vulnerability details reveal that the system's API endpoint `/api/manager/submit` is exposed to unauthenticated requests. The `group`, `username`, and `password` parameters are not appropriately validated, allowing attackers to send HTTP requests to create new users. If an attacker crafts a request with a specific set of parameters, the server responds with a success message, indicating account creation. The problem arises from a lack of input validation and inadequate security controls at this vulnerable point. This makes the endpoint susceptible to exploitation through simple HTTP request manipulation.
If exploited, this vulnerability can lead to unauthorized access to critical backend operations and data. Malicious users can create multiple high-privilege accounts, thus bypassing access control mechanisms. This could result in alterations to broadcasting schedules, access to subscriber details, disrupting services, and potentially leading to a full takeover of the IPTV service infrastructure. Moreover, it could foster an environment for further attacks, such as data breaches and content manipulation, harming the organization's credibility and security posture.
REFERENCES