I just spotted that my TinyGS started playing Wifi-Accesspoint due to local network maintenance.
It failed to connect to the pre-configured accesspoint so activated its fallback routines. The SSID was not protected by any Password so everybody was able to connect. This is a serve security problem as it for sure can be forced using targeted deauth attacks.
This might be OK during the configuration of the device for an extremely short time span.. but never should happen to a fully configured node.
I was able to
Update the firmware
Extract MQTT passwords
Extract the WGS84 coordinates
Extracting the accesspoint name (and maybe able to extract the passwords using a specially crafted firmware)
How to reproduce:
Fully setup TinyGS node
Disable the AP the device is connecting to
Wait for the device creating an AP that is having the same name as your TinyGS node
Firmware: v2105260 Device: TTGO Lora 32
Hi!
I just spotted that my TinyGS started playing Wifi-Accesspoint due to local network maintenance.
It failed to connect to the pre-configured accesspoint so activated its fallback routines. The SSID was not protected by any Password so everybody was able to connect. This is a serve security problem as it for sure can be forced using targeted deauth attacks.
This might be OK during the configuration of the device for an extremely short time span.. but never should happen to a fully configured node.
I was able to
How to reproduce:
Best Regards, Holger