search menu icon-carat-right cmu-wordmark

CERT Coordination Center


DBPOWER U818A WIFI quadcopter drone allows full filesystem permissions to anonymous FTP

Vulnerability Note VU#334207

Original Release Date: 2017-04-11 | Last Revised: 2017-04-24

Overview

The DBPOWER U818A WIFI quadcopter drone provides FTP access over its own local access point, and allows full file permissions to the anonymous user.

Description

The DBPOWER U8181A WIFI quadcopter drone is designed to record images and video from the air. The drone provides an undocumented FTP server, accessible on the local network via its local access point.

CWE-276: Incorrect Default Permissions - CVE-2017-3209

According to the reporter, the DBPower U818A WIFI quadcopter drone runs an FTP server that by default allows anonymous access without a password, and provides full filesystem read/write permissions to the anonymous user. A remote user within range of the open access point on the drone may utilize the anonymous user of the FTP server to read arbitrary files, such as images and video recorded by the device, or to replace system files such as /etc/shadow to gain further access to the device.

Furthermore, the DBPOWER U818A WIFI quadcopter drone uses BusyBox 1.20.2, which was released in 2012, and may be vulnerable to other known BusyBox vulnerabilities.

It was later reported that similar models from other suppliers appear to be vulnerable to the same vulnerability. The reporter claims that the Udirc and Forcel U818A models may be related and in fact from the same manufacturer, but the CERT/CC has not currently verified this information.

Impact

A remote user within range of the open access point on the drone may utilize the anonymous user of the FTP server to read arbitrary files, such as images and video recorded by the device, or to replace system files and gain further access to the device.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Vendor Information

334207
Expand all

DBPOWER

Notified:  February 24, 2017 Updated:  April 07, 2017

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 7.8 AV:A/AC:L/Au:N/C:C/I:C/A:N
Temporal 6.7 E:POC/RL:U/RC:UR
Environmental 5 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Junia Va lente (Cyber-Physical Systems Security Lab at UT Dallas ) fo r reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2017-3209
Date Public: 2017-04-11
Date First Published: 2017-04-11
Date Last Updated: 2017-04-24 04:14 UTC
Document Revision: 30

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.