diff --git a/http/cves/2024/CVE-2024-27497.yaml b/http/cves/2024/CVE-2024-27497.yaml new file mode 100644 index 0000000000..a702e0b8f3 --- /dev/null +++ b/http/cves/2024/CVE-2024-27497.yaml @@ -0,0 +1,34 @@ +id: CVE-2024-27497 + +info: + name: Linksys E2000 1.0.06 position.js Improper Authentication + author: DhiyaneshDk + severity: high + description: | + Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.js file. + reference: + - https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8 + - https://nvd.nist.gov/vuln/detail/CVE-2024-27497 + metadata: + verified: true + max-request: 1 + shodan-query: product:"Linksys E2000 WAP http config" + fofa-query: app="LINKSYS-E2000" + tags: cve,cve2024,linksys,auth-bypass + +http: + - method: GET + path: + - "{{BaseURL}}/position.js" + + matchers-condition: and + matchers: + - type: word + words: + - "session_key" + - "close_session" + part: body + + - type: status + status: + - 200