diff --git a/http/cves/2024/CVE-2024-7332.yaml b/http/cves/2024/CVE-2024-7332.yaml new file mode 100644 index 0000000000..f216701db6 --- /dev/null +++ b/http/cves/2024/CVE-2024-7332.yaml @@ -0,0 +1,39 @@ +id: CVE-2024-7332 + +info: + name: TOTOLINK CP450 v4.1.0cu.747_B20191224 - Hard-Coded Password Vulnerability + author: securityforeveryone + severity: critical + description: | + A critical vulnerability has been discovered in TOTOLINK CP450 version 4.1.0cu.747_B20191224. This vulnerability affects an unknown part of the file /web_cste/cgi-bin/product.ini of the Telnet Service component. The issue stems from the use of a hard-coded password, which can be exploited remotely without any user interaction. + reference: + - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CP450/product.md + - https://nvd.nist.gov/vuln/detail/CVE-2024-7332 + - https://cvefeed.io/vuln/detail/CVE-2024-7332 + - https://www.tenable.com/cve/CVE-2024-7332 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2024-7332 + cwe-id: CWE-259 + epss-score: 0.00045 + epss-percentile: 0.16226 + cpe: cpe:2.3:a:totolink:cp450:4.1.0cu.747_b20191224:*:*:*:*:*:*:* + metadata: + max-request: 2 + vendor: totolink + product: cp450_firmware + fofa-query: title="totolink" + tags: cve,cve2024,totolink + +http: + - method: GET + path: + - "{{BaseURL}}/web_cste/cgi-bin/product.ini" + + matchers: + - type: dsl + dsl: + - 'contains_all(body,"[PRODUCT]","[WLAN]","HostName")' + - 'status_code == 200' + condition: and