From 864326c47d13b8be045b021e0aa68c6aad302e2c Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Mon, 10 Apr 2023 14:05:37 -0400 Subject: [PATCH] Enhancement: cves/2022/CVE-2022-42233.yaml by md --- cves/2022/CVE-2022-42233.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2022/CVE-2022-42233.yaml b/cves/2022/CVE-2022-42233.yaml index 8ec9f4476b..53518078a9 100644 --- a/cves/2022/CVE-2022-42233.yaml +++ b/cves/2022/CVE-2022-42233.yaml @@ -5,7 +5,7 @@ info: author: For3stCo1d severity: critical description: | - Tenda 11N with firmware version V5.07.33_cn suffers from an Authentication Bypass vulnerability. + Tenda 11N with firmware version V5.07.33_cn contains an authentication bypass vulnerability. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. reference: - https://github.com/D0ngsec/vulns/blob/main/Tenda/Tenda_11N_Authentication_Bypass.md - https://nvd.nist.gov/vuln/detail/CVE-2022-42233 @@ -45,3 +45,5 @@ requests: - type: status status: - 200 + +# Enhanced by md on 2023/04/10