PT-2014-06: Arbitrary File Upload in Solar-Log

Vulnerable products

Solar-Log 200
Solar-Log 300
Solar-Log 500
Solar-Log 800e
Solar-Log 1000
Solar-Log 1200
Solar-Log 2000

Firmware: all versions before 3.1.1-66


Severity level

Severity level: High
Impact: Arbitrary Code Execution, Denial of Service
Access Vector: Remote

CVSS v2:
Base Score: 10
Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE: not assigned

Software description

Solar-Log – is a component of a photoelectric control system intended to collect data, implement a remote diagnostics and system performance monitoring.

Vulnerability description

The specialists of the Positive Research center have detected an Arbitrary File Upload vulnerability in Solar-Log.

Default web server component allows an attacker to upload files to an arbitrary path, including system file path, without authentication (or fixed solarlog:solarlog credential is used). This may lead to arbitrary code execution and/or denial of service.

How to fix

Update your firmware up to the latest version

Advisory status

11.04.2014 - Vendor gets vulnerability details
14.04.2014 - Vendor releases fixed version and details
05.05.2014 - Public disclosure


The vulnerability was detected by Artem Chaykin, Positive Research Center (Positive Technologies Company)


Reports on the vulnerabilities previously discovered by Positive Research: