From 9ae3a9301e0524d51539f22862d018d19240d58a Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Mon, 2 May 2022 14:46:42 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-35336.yaml by mp --- cves/2021/CVE-2021-35336.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-35336.yaml b/cves/2021/CVE-2021-35336.yaml index f4cf8be476..394e483e1b 100644 --- a/cves/2021/CVE-2021-35336.yaml +++ b/cves/2021/CVE-2021-35336.yaml @@ -1,10 +1,10 @@ id: CVE-2021-35336 info: - name: Unauthorised Remote Access of Internal Panel + name: Tieline IP Audio Gateway 2.6.4.8 - Unauthorized Remote Admin Panel Access author: Pratik Khalane severity: critical - description: Finding the Tieline Admin Panels with default credentials. + description: Tieline IP Audio Gateway 2.6.4.8 and below is affected by a vulnerability in the Tieline Web Administrative Interface that could allow an unauthenticated user to access a sensitive part of the system with a high privileged account. reference: - https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c - https://nvd.nist.gov/vuln/detail/CVE-2021-35336 @@ -40,3 +40,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/05/02