TCL LinkHub Mesh Wifi confctl_get_guest_wlan information disclosure vulnerability
Discription

# Talos Vulnerability Report

### TALOS-2022-1503

## TCL LinkHub Mesh Wifi confctl_get_guest_wlan information disclosure vulnerability

##### August 1, 2022

##### CVE Number

CVE-2022-27633

##### SUMMARY

An information disclosure vulnerability exists in the confctl_get_guest_wlan functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to information disclosure. An attacker can send packets to trigger this vulnerability.

##### CONFIRMED VULNERABLE VERSIONS

The versions below were either tested or verified to be vulnerable by Talos or confirmed to be vulnerable by the vendor.

TCL LinkHub Mesh Wifi MS1G_00_01.00_14

##### PRODUCT URLS

LinkHub Mesh Wifi –

##### CVSSv3 SCORE

6.5 – CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

##### CWE

CWE-200 – Information Exposure

##### DETAILS

The LinkHub Mesh Wi-Fi system is a node-based mesh system designed for Wi-Fi deployments across large homes. These nodes include most features standard in current Wi-Fi solutions and allow for easy expansion of the system by adding nodes. The mesh is managed solely by a phone application, and the routers have no web-based management console.

The LinkHub Mesh system uses protobuffers to communicate both internally on the device as well as externally with the controlling phone application. These protobuffers can be sent to port 9003 while on the Wi-Fi, or wired network, provided by the LinkHub Mesh in order to issue commands, much like the phone application would. Once the protobuffer is received, it is routed internally starting from the `ucloud` binary and is dispatched to the appropriate handler.

In this case, the handler is `confsrv`, which handles many message types. In this case we don’t actually need a specific protobuffer at all to achieve the information disclosure.

00456a24 int32_t confctl_get_guest_wlan(int32_t arg1, int32_t arg2, int32_t arg3, int32_t* arg4, int32_t* arg5)

00456a44 arg_0 = arg1
00456a48 arg_4 = arg2
00456a4c arg_8 = arg3
00456a54 int32_t var_154 = 0
00456a60 int32_t var_14c = 0
00456a68 void* const var_148 = wlan_cfg_all__descriptor

00456ad4 void var_108
00456ad4 memset(&var_108, 0, 0x100)
00456aec int32_t $v0 = malloc(8)
00456b00 int32_t $v0_2
00456b00 if ($v0 == 0) {
00456b18 puts(“djc__WlanCfg alloc memory Failed”)
00456b24 $v0_2 = 0xffffffff
00456b24 } else {
00456b48 memset($v0, 0, 8)
00456b58 int32_t var_13c_1 = 2
00456b68 int32_t $v0_4 = malloc(0x78)
00456b7c if ($v0_4 == 0) {
00456b94 puts(“djc___WlanCfg array alloc memory…”)
00456ba4 var_154 = 0xffffffff
00456ba4 } else {
00456bc4 memset($v0_4, 0, 0x78)
00456bd4 int32_t var_118_1 = 1
00456bf0 GetValue(name: “wl.guest.dhcps_enable”, output_buffer: &var_14c)
00456c20 if (strcmp(&var_14c, “1”) != 0) {
00456c48 guest_enable_flag = 0
00456c4c int32_t var_114_2 = 0
00456c4c } else {
00456c30 guest_enable_flag = 1
00456c38 int32_t var_114_1 = 1
00456c38 }
00456c50 int32_t var_150_1 = 0
00456d4c while (true) {
00456d4c if (var_150_1 s>= 2) {
00456d60 int32_t $v0_27 = malloc(0x14)
00456d74 if ($v0_27 == 0) {
00456d9c _td_snprintf(3, “api/wifi_module.c”, 0x2cf, “WlanTimeChoice array alloc memor…”, 0x4ae4b0)
00456dac var_154 = 0xffffffff
00456dac } else {
00456dcc memset($v0_27, 0, 0x14)
00456de4 wlan_time_choice__init($v0_27)
00456e10 *($v0_27 + 0x10) = malloc(0xc)
00456e1c if (*($v0_27 + 0x10) == 0) {
00456e28 var_154 = 0xffffffff
00456e28 } else {
00456e40 **($v0_27 + 0x10) = 0x3840
00456e54 *(*($v0_27 + 0x10) + 4) = 0x7080
00456e68 *(*($v0_27 + 0x10) + 8) = 0xffffffff
00456e74 *($v0_27 + 0xc) = 3
00456e7c int32_t var_134_1 = $v0_27
00456ea4 if (GetValue(name: “sys.cfg.stamp”, output_buffer: &var_108) != 0) {
00456ebc int32_t var_128_2 = 1
00456ed0 int32_t $v0_44
00456ed0 int32_t $v1_8
00456ed0 $v0_44, $v1_8 = atoll(&var_108)
00456edc int32_t var_120_1 = $v0_44
00456ee0 int32_t var_11c_1 = $v1_8
00456ee0 } else {
00456eac int32_t var_128_1 = 0
00456eac }
00456f08 *arg5 = wlan_cfg_all__get_packed_size(&var_148)
00456f34 *arg4 = malloc(*arg5)
00456f40 if (*arg4 != 0) {
00456f74 wlan_cfg_all__pack(&var_148, *arg4)
00456f5c } else {
00456f4c var_154 = 0xffffffff
00456f4c }
00456f4c }
00456f90 sub_454a98($v0_27)
00456f90 }
00456d74 break
00456d74 }
00456c60 int32_t $v0_8 = var_150_1 Read More

Back to Main

Subscribe for the latest news:
Generated by Feedzy
%d bloggers like this: