Persistent Session Hijacking Vulnerability in Airtame HDMI Dongle Web Panel

Persistent Session Hijacking Vulnerability in Airtame HDMI Dongle Web Panel

CVE-2017-15304 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.

Learn more about our Web App Pen Testing.