From 61812f679d25a89b1a2c178d5fb0842c9d730ef5 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Sun, 14 Aug 2022 18:07:55 +0530 Subject: [PATCH] Update CVE-2020-10973.yaml --- cves/2020/CVE-2020-10973.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-10973.yaml b/cves/2020/CVE-2020-10973.yaml index 5625bce21f..693590da50 100644 --- a/cves/2020/CVE-2020-10973.yaml +++ b/cves/2020/CVE-2020-10973.yaml @@ -8,10 +8,12 @@ info: An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-10973 + classification: + cve-id: CVE-2020-10973 metadata: verified: true shodan-query: http.html:"WN551K1" - tags: cve,cve2020,access,control,wavlink + tags: cve,cve2020,exposure,wavlink requests: - raw: