diff --git a/cves/2020/CVE-2020-10973.yaml b/cves/2020/CVE-2020-10973.yaml index 5283a42188..4f3615304c 100644 --- a/cves/2020/CVE-2020-10973.yaml +++ b/cves/2020/CVE-2020-10973.yaml @@ -7,18 +7,19 @@ info: description: | An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available. reference: + - https://github.com/sudo-jtcsec/CVE/blob/master/CVE-2020-10973 - https://nvd.nist.gov/vuln/detail/CVE-2020-10973 classification: cve-id: CVE-2020-10973 metadata: verified: true - shodan-query: http.html:"WN551K1" + shodan-query: http.html:"Wavlink" tags: cve,cve2020,exposure,wavlink requests: - raw: - | - GET /cgi-bin/ExportAllSettings.sh HTTP/1.1 + GET /backupsettings.dat HTTP/1.1 Host: {{Hostname}} matchers-condition: and @@ -26,7 +27,12 @@ requests: - type: word part: body words: - - 'url=/backupsettings.dat' + - 'Salted__' + + - type: word + part: header + words: + - application/octet-stream - type: status status: