Enhancement: cves/2020/CVE-2020-13117.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-05-16 11:58:22 -04:00
parent ab6f32bcc5
commit 205cd855e6
1 changed files with 5 additions and 3 deletions

View File

@ -1,13 +1,13 @@
id: CVE-2020-13117
info:
name: Wavlink Multiple AP - Unauthenticated RCE
name: Wavlink Multiple AP - Remote Command Injection
author: gy741
severity: critical
description: Several Wavlink products are affected by a vulnerability that may allow remote unauthenticated users to execute arbitrary commands as root on Wavlink devices. The user input is not properly sanitized
which allows command injection via the "key" parameter in a login request. It has been tested on Wavlink WN575A4 and WN579X3 devices, but other products may be affected.
description: Wavlink products are affected by a vulnerability that may allow remote unauthenticated users to execute arbitrary commands as root on Wavlink devices. The user input is not properly sanitized which allows command injection via the "key" parameter in a login request. It has been tested on Wavlink WN575A4 and WN579X3 devices, but other products may also be affected.
reference:
- https://blog.0xlabs.com/2021/02/wavlink-rce-CVE-2020-13117.html
- https://nvd.nist.gov/vuln/detail/CVE-2020-13117
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
@ -31,3 +31,5 @@ requests:
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
# Enhanced by mp on 2022/05/16