From b9e6167aca5adb2c7d85e8e246cb3b578d5433bc Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 10 May 2022 12:19:23 -0400 Subject: [PATCH] Enhancement: cves/2016/CVE-2016-5649.yaml by mp --- cves/2016/CVE-2016-5649.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2016/CVE-2016-5649.yaml b/cves/2016/CVE-2016-5649.yaml index 3d9903e65e..1de8edc415 100644 --- a/cves/2016/CVE-2016-5649.yaml +++ b/cves/2016/CVE-2016-5649.yaml @@ -4,7 +4,7 @@ info: name: NETGEAR DGN2200 / DGND3700 - Admin Password Disclosure author: suman_kar severity: critical - description: A vulnerability exists within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. The attacker can then use this password to gain administrator access of the targeted router's web interface. + description: "NETGEAR DGN2200 / DGND3700 is susceptible to a vulnerability within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. The attacker can then use this password to gain administrator access of the targeted router's web interface." reference: - https://nvd.nist.gov/vuln/detail/CVE-2016-5649 classification: @@ -39,3 +39,5 @@ requests: group: 1 regex: - 'Success "([a-z]+)"' + +# Enhanced by mp on 2022/05/10