diff --git a/cves/2022/CVE-2022-34046.yaml b/cves/2022/CVE-2022-34046.yaml index 7b4e2abb86..5980cd828d 100644 --- a/cves/2022/CVE-2022-34046.yaml +++ b/cves/2022/CVE-2022-34046.yaml @@ -1,7 +1,7 @@ id: CVE-2022-34046 info: - name: Wavlink Sysinit.shtml Password Leak + name: Wavlink Sysinit.shtml - Password Exposure author: For3stCo1d severity: high description: | @@ -10,8 +10,9 @@ info: - https://drive.google.com/file/d/18ECQEqZ296LDzZ0wErgqnNfen1jCn0mG/view?usp=sharing - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34046 metadata: + verified: true shodan-query: http.title:"Wi-Fi APP Login" - tags: cve,cve2022,wavlink,router,leak + tags: cve,cve2022,wavlink,router,exposure requests: - raw: @@ -24,8 +25,7 @@ requests: - type: word part: body words: - - "var syspasswd" - - 'logincheck(user);' + - 'var syspasswd="' - 'APP' condition: and