From 02c6066afdd81096ff33aac8e467ede981b42517 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 10 May 2022 12:00:01 -0400 Subject: [PATCH] Enhancement: cves/2016/CVE-2016-1555.yaml by mp --- cves/2016/CVE-2016-1555.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-1555.yaml b/cves/2016/CVE-2016-1555.yaml index 4aea26dbed..fc3e8a3a38 100644 --- a/cves/2016/CVE-2016-1555.yaml +++ b/cves/2016/CVE-2016-1555.yaml @@ -1,7 +1,7 @@ id: CVE-2016-1555 info: - name: NETGEAR WNAP320 Access Point Firmware Remote Command Execution + name: NETGEAR WNAP320 Access Point Firmware - Remote Command Injection author: gy741 severity: critical description: NETGEAR WNAP320 Access Point Firmware version 2.0.3 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. @@ -30,3 +30,5 @@ requests: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" + +# Enhanced by mp on 2022/05/10