What is a Kramer VIA GO²?
Kramer VIA GO² is a wireless presentation system supporting 4K output and seamless connectivity for users on iOS, Android, Chromebook, PC, and Mac. The updated VIA 4.0 platform offers an intuitive, user-friendly interface that simplifies the connection process. All users, including guests, can connect easily and securely, with sessions automatically ending upon disconnection.
Security Vulnerabilities Overview
During testing of a device using default credentials (su:supass), it was discovered that the system allowed files with arbitrary extensions to be uploaded—including PHP scripts disguised as fonts. Once the file path was identified, the script could be executed via a browser, resulting in remote command execution (RCE). This access enabled extraction of the web application’s PHP source code, which had been obfuscated using IONCube. However, this protection was bypassed using freely available online tools.
Three critical vulnerabilities were found by reviewing available handler endpoints. While this review was limited, it is likely that additional issues remain in the codebase.
An audit of firmware version 4.0.1.1326 confirmed that the vulnerable handlers had been removed. The firmware’s update script (runpkg.sh) included commands to delete specific vulnerable files. Although the firmware was password protected, the decryption password was readily available within the source code.
Proofs of Concept
CVE-2023-33507 – Unauthenticated File Read
An unauthenticated user could retrieve the contents of sensitive files, such as /etc/passwd, by manipulating the downloadRecording.php endpoint.
CVE-2023-33509 – Unauthenticated SQL Injection
SQL injection was possible via the downloadMedia.php endpoint. Attackers could manipulate query parameters to extract data or read files such as /etc/passwd through crafted SQL statements.
CVE-2023-33508 – Unauthenticated Remote Code Execution via File Upload
The endpoint UploadWallpaper.php accepted unauthenticated file uploads. If it returned a prompt asking for an image to upload, it was likely exploitable. A PHP shell could be uploaded and accessed remotely, allowing full control over the device.
Potential Impact
These vulnerabilities allow attackers to take full control of the device through remote code execution or by collecting user credentials via embedded components.
Remediation
Update to firmware version 4.0.1.1326 or later, ensuring the system is first upgraded to version 4.0.
Disclosure Timeline
- 21 February 2023 – Reported to CERT
- 9 March 2023 – Vendor acknowledged the issue
- 17 March 2023 – Vendor released patched firmware; vulnerable endpoints confirmed removed
- 31 May 2023 – CVEs officially assigned