diff --git a/default-logins/samsung/samsung-wlan-default-login.yaml b/default-logins/samsung/samsung-wlan-default-login.yaml index 9b2e264515..eab5d8d380 100644 --- a/default-logins/samsung/samsung-wlan-default-login.yaml +++ b/default-logins/samsung/samsung-wlan-default-login.yaml @@ -4,8 +4,15 @@ info: name: Samsung Wlan AP (WEA453e) Default Login author: pikpikcu severity: high - reference: https://iryl.info/2020/11/27/exploiting-samsung-router-wlan-ap-wea453e/ + description: Samsung Wlan AP (WEA453e) default root credentials were discovered. + reference: + - https://securityforeveryone.com/tools/samsung-wlan-ap-wea453e-default-credentials-scanner tags: samsung,default-login + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cve-id: + cwe-id: CWE-522 requests: - raw: @@ -33,3 +40,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/03/11