Commit Graph

8 Commits (6be998f1e999674cab5bcd4e459549dd6e84ffe0)

Author SHA1 Message Date
MostInterestingBotInTheWorld 3df1a0b83d Enhancement: default-logins/hongdian/hongdian-default-login.yaml by mp 2022-03-10 13:46:40 -05:00
MostInterestingBotInTheWorld b4aee4298d Enhancement: default-logins/hongdian/hongdian-default-login.yaml by mp 2022-03-10 11:28:23 -05:00
Brian Zebrowski a19bd14fee Modified most of the default_logins templates to output username and password fields consistently 2021-10-08 12:42:54 -04:00
sandeep b335b6a686 more updates 2021-09-22 16:09:21 +05:30
sandeep a58515594a misc update 2021-09-22 16:07:07 +05:30
Prince Chaddha 807920c0ac clean-up 2021-09-21 17:16:53 +05:30
sandeep 609705f676 removed extra headers not required for template 2021-09-08 17:47:19 +05:30
GwanYeong Kim 3bf1c929ed Create Hongdian Vulnerability
CVE-2021-28149 : Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file.

CVE-2021-28150 : Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi.

CVE-2021-28151 : Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-10 21:16:35 +09:00