Update CVE-2022-34046.yaml

patch-1
Prince Chaddha 2022-07-21 13:28:24 +05:30 committed by GitHub
parent 2a4041fa14
commit 0108d19f52
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 4 additions and 4 deletions

View File

@ -1,7 +1,7 @@
id: CVE-2022-34046 id: CVE-2022-34046
info: info:
name: Wavlink Sysinit.shtml Password Leak name: Wavlink Sysinit.shtml - Password Exposure
author: For3stCo1d author: For3stCo1d
severity: high severity: high
description: | description: |
@ -10,8 +10,9 @@ info:
- https://drive.google.com/file/d/18ECQEqZ296LDzZ0wErgqnNfen1jCn0mG/view?usp=sharing - https://drive.google.com/file/d/18ECQEqZ296LDzZ0wErgqnNfen1jCn0mG/view?usp=sharing
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34046 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34046
metadata: metadata:
verified: true
shodan-query: http.title:"Wi-Fi APP Login" shodan-query: http.title:"Wi-Fi APP Login"
tags: cve,cve2022,wavlink,router,leak tags: cve,cve2022,wavlink,router,exposure
requests: requests:
- raw: - raw:
@ -24,8 +25,7 @@ requests:
- type: word - type: word
part: body part: body
words: words:
- "var syspasswd" - 'var syspasswd="'
- 'logincheck(user);'
- '<title>APP</title>' - '<title>APP</title>'
condition: and condition: and