diff --git a/vulnerabilities/other/huawei-router-auth-bypass.yaml b/vulnerabilities/other/huawei-router-auth-bypass.yaml index cccd4c301f..2abe7162fc 100644 --- a/vulnerabilities/other/huawei-router-auth-bypass.yaml +++ b/vulnerabilities/other/huawei-router-auth-bypass.yaml @@ -4,9 +4,13 @@ info: name: Huawei Router - Authentication Bypass author: gy741 severity: critical - description: The default password of this router is the last 8 characters of the device's serial number which exist in the back of the device. + description: Huawei Routers are vulnerable to authentication bypass because the default password of this router is the last 8 characters of the device's serial number which exist on the back of the device. reference: - https://www.exploit-db.com/exploits/48310 +classification: + cvss-metrics: CVSS:10.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.0 + cwe-id: CWE-288 tags: huawei,auth-bypass,router requests: