Vulnerability Note VU#334207
DBPOWER U818A WIFI quadcopter drone allows full filesystem permissions to anonymous FTP
Original Release date: 11 Apr 2017 | Last revised: 24 Apr 2017
The DBPOWER U818A WIFI quadcopter drone provides FTP access over its own local access point, and allows full file permissions to the anonymous user.
The DBPOWER U8181A WIFI quadcopter drone is designed to record images and video from the air. The drone provides an undocumented FTP server, accessible on the local network via its local access point.
CWE-276: Incorrect Default Permissions – CVE-2017-3209
According to the reporter, the DBPower U818A WIFI quadcopter drone runs an FTP server that by default allows anonymous access without a password, and provides full filesystem read/write permissions to the anonymous user. A remote user within range of the open access point on the drone may utilize the anonymous user of the FTP server to read arbitrary files, such as images and video recorded by the device, or to replace system files such as /etc/shadow to gain further access to the device.
Furthermore, the DBPOWER U818A WIFI quadcopter drone uses BusyBox 1.20.2, which was released in 2012, and may be vulnerable to other known BusyBox vulnerabilities.
It was later reported that similar models from other suppliers appear to be vulnerable to the same vulnerability. The reporter claims that the Udirc and Forcel U818A models may be related and in fact from the same manufacturer, but the CERT/CC has not currently verified this information.
A remote user within range of the open access point on the drone may utilize the anonymous user of the FTP server to read arbitrary files, such as images and video recorded by the device, or to replace system files and gain further access to the device.
The CERT/CC is currently unaware of a practical solution to this problem.
Vendor Information (Learn More)
VendorStatusDate NotifiedDate UpdatedDBPOWERAffected24 Feb 201707 Apr 2017If you are a vendor and your product is affected, let
CVSS Metrics (Learn More)
Thanks to Junia Valente (Cyber-Physical Systems Security Lab at UT Dallas) for reporting this vulnerability.
This document was written by Garret Wassermann.
11 Apr 2017
Date First Published:
11 Apr 2017
Date Last Updated:
24 Apr 2017
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.