/bin/login.php in the Web Panel on the Airtame HDMI...
Critical severity
Unreviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Oct 15, 2017
Published to the GitHub Advisory Database
May 17, 2022
Last updated
Feb 3, 2023
/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.
References