From df24bd178da1de6bc775f05616a8ac9353b9b3cd Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Fri, 3 Feb 2023 13:00:22 -0500 Subject: [PATCH] Enhancement: exposed-panels/avtech-dvr-exposure.yaml by md --- exposed-panels/avtech-dvr-exposure.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/exposed-panels/avtech-dvr-exposure.yaml b/exposed-panels/avtech-dvr-exposure.yaml index 53b2cd9dc5..7b215468cb 100644 --- a/exposed-panels/avtech-dvr-exposure.yaml +++ b/exposed-panels/avtech-dvr-exposure.yaml @@ -1,10 +1,10 @@ id: avtech-dvr-exposure info: - name: Avtech AVC798HA DVR Information Exposure + name: AVTECH AVC798HA DVR - Information Exposure author: geeknik severity: low - description: CGI programs under the /cgi-bin/nobody directory can be accessed without authentication. + description: AVTECH AVC798HA DVR is susceptible to information exposure. CGI scripts in the /cgi-bin/nobody directory can be accessed without authentication. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized operations. reference: - http://www.avtech.com.tw/ tags: dvr,exposure,avtech @@ -25,3 +25,5 @@ requests: - "MACAddress=" - "Product.Type=" condition: and + +# Enhanced by md on 2023/02/03