### - Post Oak Traffic Systems AWAM Bluetooth Field Device -RCE - (CVE-2020-9021)
[](https://images.seebug.org/1583460105812-w331s)
"AWAM Bluetooth Field Device " devices, as the company behind them
"<http://www.postoaktraffic.com/>" says, are devices for monitoring traffic,
by capturing the MAC addresses of the Bluetooth devices that you could
commonly have in your car, such as cell phone, headphones or the car's own
bluetooth. This simply seemed very interesting, so I decided to test the
safety of these devices.
As I recently got an injection of code in a device with similar
characteristics I decided to try the same route
[](https://images.seebug.org/1583460111859-w331s)
So, in the "Time Settings" function it is possible to inject commands, just by
casting ";" after the hostname of the NTP server to which you want to
synchronize. So using "Curl" I assemble the following command to achieve a
reverse shell
[](https://images.seebug.org/1583460115150-w331s)
Shodan:
[](https://images.seebug.org/1583460117651-w331s)
**
------
------
------
------
------
------
------
------
------
------
------
------
------
------
------
------
****Affected versions:**
_
__Firmware Version 7400v2.08.21.2018_
_Firmware Version 7800SD.2015.1.16_
_Firmware Version 2011.3_
_Firmware Version 7400v2.02.01.2019_
_Firmware Version 7800SD.2012.12.5_
**CVE-2020-9021**
By: @linuxmonr4
Unavailable Comments