Overview
A serious vulnerability has been discovered in the TeleControl Server Basic, potentially affecting all versions prior to V3.1.2.2. This vulnerability, identified as CVE-2025-30030, poses a significant risk to the security of systems running these versions of the application, as it enables SQL injection attacks via the ‘ImportDatabase’ method. This issue is of particular concern because it allows an authenticated remote attacker to bypass authorization controls, read from and write to the application’s database, and execute code with “NT AUTHORITYNetworkService” permissions.
Vulnerability Summary
CVE ID: CVE-2025-30030
Severity: High (8.8 CVSS)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: Potential system compromise or data leakage
Affected Products
No phone number, email, or personal info required.
Product | Affected Versions
TeleControl Server Basic | All versions < V3.1.2.2 How the Exploit Works
The vulnerability lies in the ‘ImportDatabase’ method used internally by the affected application. An authenticated user can exploit this by injecting malicious SQL commands which the system then executes. In successful cases, this can lead to the user bypassing authorization controls, gaining the ability to read from and write to the application’s database and execute code with elevated permissions.
Conceptual Example Code
POST /ImportDatabase HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "database": "main;DROP TABLE users;" }
The above example is a conceptual demonstration of an SQL Injection attack. The string after the semicolon is a malicious SQL command that would be executed by the server if not properly sanitized. This particular command would delete the “users” table from the database, potentially causing significant data loss.
Mitigation
The vendor has released a patch to fix this vulnerability, and it is highly recommended to apply this patch as soon as possible. The patch upgrades the application to version V3.1.2.2, which is not affected by this vulnerability.
As a temporary mitigation, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can be used to monitor and block suspicious activity. However, these are not foolproof methods and should only be used as a temporary solution until the patch can be applied.
In addition, it is recommended to restrict network access to port 8000, which is needed for the exploit. Only trusted sources should be allowed to access this port.