CVE-2025-13315, CVE-2025-13316 Critical Twonky Server Authen... #1612
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Scope & Impact
Twonky Server 8.5.2 (latest version at time of research) on Linux (e.g., Ubuntu 22.04.1) and Windows (e.g., Windows Server 2022) is affected by two chained vulnerabilities that give an unauthenticated remote attacker access to administrator credentials and full web admin control. CVE-2025-13315 (CVSS 9.3, Critical) allows authentication bypass of specific RPC web API endpoints via an alternate routing prefix, enabling leakage of logs that contain encrypted admin cred...
🔧 Technical Details
Routing-based auth bypass via alternate /nmc/rpc prefix
The core trick is to abuse Twonky’s dual routing prefixes. Admin RPC handlers (e.g.,
log_getfile,stop) are protected when accessed under/rpc, but the same handler logic is also reachable under/nmc/rpcwithout the same auth checks. An attacker sends unauthenticated HTTP requests likeGET /nmc/rpc/log_getfileto download the entire application log. Because Twonky logs theaccessuserand encryptedaccesspwdat startup, the log file itself becomes a credential leak source. This generalizes to any environment where alternate routing paths are not covered by auth middleware.Reversible password encryption via static Blowfish key table
The second trick exploits a flawed symmetric encryption scheme. Twonky’s
enc_passwdfunction chooses an index 0–11, looks up a corresponding Blowfish key from a co...🤖 Agent Actions
Summary:
web-vulnerabilities-methodology.mdwith a new subsection describing routing/path-prefix based authentication bypasses, using Twonky Server’s/nmc/rpc/*exposure to outline exploitation workflow and defensive monitoring tips.Tests: Not run (not requested).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.