diff --git a/cves/2022/CVE-2022-34046.yaml b/cves/2022/CVE-2022-34046.yaml index d6e06bf5cd..13197c5764 100644 --- a/cves/2022/CVE-2022-34046.yaml +++ b/cves/2022/CVE-2022-34046.yaml @@ -1,15 +1,16 @@ id: CVE-2022-34046 info: - name: Wavlink Sysinit.shtml - Password Exposure + name: WAVLINK WN533A8 - Access Control author: For3stCo1d severity: high description: | - An access control issue in Wavlink WN533A8 M33A8.V5030.190716 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);]. + WAVLINK WN533A8 M33A8.V5030.190716 is susceptible to improper access control. An attacker can obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);] and thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations. reference: - https://drive.google.com/file/d/18ECQEqZ296LDzZ0wErgqnNfen1jCn0mG/view?usp=sharing - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34046 - http://packetstormsecurity.com/files/167890/Wavlink-WN533A8-Password-Disclosure.html + - https://nvd.nist.gov/vuln/detail/CVE-2022-34046 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 @@ -43,3 +44,5 @@ requests: - type: regex regex: - 'syspasswd="(.+?)"' + +# Enhanced by md on 2023/02/03