What happened?
A few weeks ago, researchers from Vulnerability-Lab came across an anomaly on a private broadcast of internet radio. Further investigation into the matter led them to an undocumented telnetd server on the standard port 23 of the internet radio during a port scan. It was found that the network had enabled port forwarding for all ports, allowing adversaries to gain unauthorized access to the radio and to the OS subsequently.
The issue (CVE-2019-13473) was found in the internet radios of Imperial Dabman which are distributed in Germany by Telestar Digital GmbH. The products are sold across Europe via eBay, Amazon resellers. The devices utilize Bluetooth and Internet connectivity, and are based on BusyBox Debian Linux.
The second vulnerability (CVE-2019-13474) detected in the AirMusic client onboard the device permitting unauthenticated command-execution. “Using the mobile application on Apple iOS in combination with the port scan result shows us by intuition that the AirMusic client may be connecting on port 80 through 8080 httpd to send and receive commands,” said the researchers.
The researchers also released a proof-of-concept video showing how the devices could be exploited.
What is the scope of the attack?
It is estimated that over 1 million models of the Imperial Dabman internet radio series could be vulnerable. By exploiting this vulnerability, attackers can perform malicious activities such as:
How was it resolved?
Addressing the concern, Telstar said that it will not be using Telnet going forward. For existing deployments, it released manual binary patches that can be downloaded from the Telestar Digital Gmbh website. Also, an automated over-the-air update will be made available via the webradio firmware update function in the local settings menu. The process for installing the update is as follows:
Publisher