Impact: a malicious web page can cause a browser to submit actions to these endpoints (especially bad when combined with missing auth).
MediumUnauthenticated favorites modification
Affected endpoint: /alltune2/public/favorites.php
Impact: attacker can add/alter shared favorites entries (integrity/ops confusion).
Safety warning
Running the PoCs with --do performs real actions (disconnects, restarts, DTMF, writes to favorites).
Run only on systems you own and preferably a test node.
Suggested fixes (priority order)
Put an auth gate in front of all of /alltune2/ (Apache auth, VPN-only access, or app-level login + authorization checks).
Network restrict: bind to LAN only, firewall, and do not expose to the public internet.
Add CSRF defenses for every state-changing POST: CSRF token + Origin/Referer validation + session cookie SameSite.
Harden sessions: set cookie flags before session_start() (HttpOnly, Secure when HTTPS, SameSite=Lax/Strict).
Reduce sudo surface: prefer a small root-owned helper/daemon with a strict allowlist instead of broad sudo execution from PHP.
Logging/alerting: log caller IP + action + outcome for all state changes.
This page is informational. The PoCs live in alltune2/ and should be executed from the CLI.