nuclei-templates/cves/2021/CVE-2021-42627.yaml

44 lines
1.3 KiB
YAML
Raw Normal View History

2022-08-24 02:47:25 +00:00
id: CVE-2021-42627
info:
2022-08-24 03:19:11 +00:00
name: D-Link DIR-615 - Unauthorized Access
2022-08-24 02:47:25 +00:00
author: For3stCo1d
severity: critical
2022-08-24 02:47:25 +00:00
description: |
The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page.
reference:
- https://github.com/sanjokkarki/D-Link-DIR-615/blob/main/CVE-2021-42627
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42627
- https://www.dlink.com/en/security-bulletin/
2022-08-24 08:38:00 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
2022-08-24 08:38:00 +00:00
cve-id: CVE-2021-42627
2022-08-24 02:47:25 +00:00
metadata:
shodan-query: http.title:"Roteador Wireless"
verified: "true"
2022-08-25 07:08:49 +00:00
tags: cve,cve2021,d-link,router,unauth,dir-615,roteador
2022-08-24 02:47:25 +00:00
requests:
2022-08-24 08:38:00 +00:00
- method: GET
path:
- "{{BaseURL}}/wan.htm"
2022-08-24 02:47:25 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
2022-08-24 08:38:00 +00:00
- "src='menu.js?v=\"+Math.random()+\"'></scr\"+\"ipt>\");"
- "var ipv6conntype"
condition: and
2022-08-24 02:52:29 +00:00
2022-08-24 02:47:25 +00:00
- type: word
part: header
words:
- Virtual Web
- type: status
status:
- 200